Nationwide systems failure of the electricity transmission grid is unlikely, but what are the risks? What happens in a black start? Could space weather cause data loss? How do you access knowledge without electricity?
Balancing security, privacy and convenience is not easy. I’ve spent quite a lot of time figuring out how to configure my various computer systems with this goal in mind.
Many incidents of fraud occur not through cards being physically stolen, but through breaches in security at the shops we buy products from. Should companies be required to publish security reviews?
There are lots of things you should be doing. At Server Density, we used a simple checklist that everyone would verify every 6 months.
Email is insecure. Anything of any importance should be saved somewhere else. It’s not a good database, so shouldn’t be treated like one.
When it comes to insurance, it’s the same as locking up and installing an alarm
Unlimited attack surfaces. Users not paying attention to basic security practices. Vague vendor promises. It looks like a very immature landscape where things are just getting started.
Everyone should have an expectation of being able to communicate with someone else in a verifiably secure manner.
There’s no predicting when a cyber attack might come, whether it be in the form of a DDoS, a virus, malware, or phishing. It’s therefore important to be constantly vigilant, and prepared for incidents when they do occur.