- December 27th, 2022, 6:59 am
#431751
The Secure Methodology Overview
Step 1: Awareness. Awareness of ourselves and the world around us empowers us with options.
Step 2: Mindset. Our mind is a powerful tool that we can use to our advantage or disadvantage.
Step 3: Acknowledgment. Acknowledgment of ourselves and others reminds us of what we are capable of and motivates us.
Step 4: Communication. Our fulfillment in life boils down to how well we communicate with ourselves and others.
Step 5: Monotasking. Presence is our ally; distraction is our enemy.
Step 6: Empathy. Our inner demons, successes, and failures connect us to humanity.
Step 7: Kaizen. Continuous improvement is necessary for evolution.
Espinosa, Christian. The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity (pp. 16-17). Lioncrest Publishing. Kindle Edition.
When I saw this overview, I first of all thought: What has this to do with cybersecurity? But then I thought of my time working as a manager of a group of care homes and having to ensure that medical data was secure, especially after the new outline on cybersecurity from the European Union came along and our compliance strategy was updated, we ended up realising that it is the self-discipline that had to be improved.
We looked at the use of computers, at access to the internet, anti-virus and anti-trojan software, but in the end, it comes down to people and their abilities.
“Find someone who makes you realise three things:
One, that home is not a place, but a feeling.
Two, that time is not measured by a clock, but by moments.
And three, that heartbeats are not heard, but felt and shared.”
― Abhysheq Shukla