Back in October 2010 I wrote an article about personal choices being the most powerful information security tool. It is now January 2015 and while other things have changed, this simple fact has not. You are still the most critical piece in both your personal and work information security apparatus. In light of all the recent developments including the very high profile hacking of Sony Pictures Entertainment and while preparing for an upcoming speaking engagement, I decided it was time to refresh some of the content here on my blog.
The Next Steps
This is obviously article #1 of this series, what will be addressed in 2-4 and why?
- Where we are most vulnerable online.
- A powerful tool to keep you safe online.
- Other valuable tools for Personal Information Security.
Where are we most vulnerable online?
In this section the specific applications and services that are most likely to lead to a compromise of your information security are to occur. This will enable you to be particularly cautious and invest time where it is most likely to spare you the inconvenience and expense of being compromised.
What tools are available to protect you online?
With knowledge of where you are most vulnerable, we’ll address one particular tool that will help protect you. It is unlikely that you’ve heard of this tool, but you will find that it is a powerful asset to keep you safe.
Other Valuable Tools
Some extra tools are covered that will help make your online experience more secure.