Time has no beginning and no end. We can neither slow down or accelerate time, nor should we want to. We divide time into units yet it remains infinite. Time is something we all have but never have enough of. We kill time, waste time, save time, and change time, but we can never create more time. Spend your time wisely and cherish the time given to you. Make time for family and friends. Do not waste your time at work and always go home on time. Remember that while there may be more work, there is never more time.
We live in a time where even traditional crime has moved online. Offences such as racketeering and trafficking, once the domain of local or international crime syndicates, exist in a virtual sense and are no longer limited to dark alleys and nondescript warehouses or even exclusive clubs and sprawling, palatial estates. Activities can take place virtually anywhere, any time, and be undertaken by nearly anybody. One can even equate recent cybercrimes to the long-standing practice of kidnapping and being held for ransom. Data is now substituted for people, but the impact is just as critically significant. Remain vigilant. Stay safe.
I have been “cautioned” over the years about giving away free knowledge through blogs, social media posts, and articles. While disguised as advice, their intent has always appeared to come from a hidden agenda to package my thoughts and sell them to the highest bidder. My intent has always been to be thought provoking and to engage in discussions around the digital challenges that face humanity. Action is more likely when driven by internal motivation rather than external direction. For Cyber Security challenges, I am sure we agree that we need all the help we can get, free or otherwise.
I have often said that, “Information Technology is the only industry whose growth is dependent on the problems it creates” with good reason. Touted as a solution that will eliminate human error, we forget that humans create technology which is therefore susceptible to human error itself. If technology was perfect, there would be no operating system patches, upgrades, or vulnerabilities to address. Often, in the rush to get new technology to market, corners are cut and issues overlooked. Good becomes simply good enough. The inevitable impact is that problems arise and must be dealt with, driving growth. And more problems.
The balance between work and home life seems to be more concept than reality. Often used as a marketing ploy to lure talent, many organisations seem to drop the ball when it comes to promoting equilibrium and looking after their people. We are equally guilty of failing to hold business to its word or looking after our own best interests. My doctor once told me that “We work to live, not live to work” and coming from a medical professional, it is solid advice. Sacrificing your health, friends, and family to pursue someone else’s dream can become your own nightmare.
For every action, there is an equal and opposite malfunction. While I am an advocate for system hardening, it must be done bearing the context and business needs in mind. Simply applying the latest firmware and patches looks like a good idea in practice, but doing so blindly and without planning to understand the pros and cons can be more of a hindrance than a help. The same holds true for disabling and removing services, installing new tools and taking a draconian approach to policies. Sometimes you break more than you fix, ending up doing the hackers job for them.
Cyber Security is a constant learning curve that changes daily. New threats are emerging while old threats continue to plague us. Entering the workforce after years of education, we are bombarded with reminders to be vigilant. I often think many have begun their cyber security awareness training too late. With nearly every child today not knowing a world without the Internet, smart phones, and millions of apps, are we finding more willful ignorance or simply desensitisation? Experience and cyber smarts are best started from an early age to gain a crucial employment advantage, protect our valuable data, and remain secure.