Thursday, August 30, 2018

Real Cyber Security Is A Three Letter Word; YOU!

Real Cyber Security Is A Three Letter Word; YOU!


Computer security, like securing your home or your car, is just the same, it is up to you to make sure the doors are locked and you know where the keys are.  Like everyone else, we have all locked ourselves out and had to have assistance to gain entry and paid for it.





Yes, it is up to you!  Not your Mother, Grandma or the wife, YOU!

The ease of someone gaining entry to your most inner secrets is partially the government's fault.  They have used something that you have been told to never divulge to anyone.  

In America, the Social Security Number.  That most sacred of digits that were applied for by your parents.  Since its inception it has been used as a way to identify you, your mark, so to speak.  It opens a Pandora’s Box, to which thieves, steal it, use it, and you pay the consequences. 

All because the government made you us your SSN#.

So what is the answer to this latch-key that is hanging out there for all to use?  

Stop using it!  Refuse to give it to anyone!

Passwords have been with us since the beginning of time and it has been the main method to secretly enter a myriad of locked secrets.  Even in the prohibition days at the Speak-Easy, the slot in the door would open and you gave the password of the night to gain entry.

Today, we have so many passwords to remember, that some even write them down, place them in their wallet or pocketbook.  Or, heaven forbid, in a file on their computer, smart mobile phone or tablet!

The computer, that is what a smart mobile phone or tablet is, a computer, you have been indoctrinated to use a password to secure your precious information, the guarded secrets of your inner world.  So why do you share them with family members, business associates and even put them on a notice board?

Passwords have gone beyond being secure and the human element stepped in decades ago.  Yes, humans, you and I, are forgetful beasts and dumb in many ways in our actions. 

Time to dump the password!  I mean dump, get rid of, never use again.  Now that would be one bad headache to remove.

I know you are panicking and wondering how you are going to lock your information away from prying eyes.  Simple, just like key-locks have now moved into the computer age, we shall use something electronic.  A digital lock, you know, the one where you have a keypad and you type in your password..., wait a minute, we just came full circle and have forgotten to dump the physical password system and…

No, there is another, proven method, Device DNA!  Not new, but solid and you are wondering why you have never heard of it!   Simple question and an even simpler answer, the reason is, we are stuck in traditional ways that have been programmed over the decades, if not centuries. 

Just like a dog spins around before going to sleep in its bed, it is flattening the grass of the field where its ancestors slept to make a comfortable bed for the night. 

We have been spinning our proverbial wheels and do the same old same old and never thought to change.  Even accepting that it is not a secure method in the first place and suffering the consequences.

Firstly, you must scan your computer with one of the proven programs to check for virus etc.  Yes, take time to do it!  You are then starting from an even baseline and we can move forward.

Virus and malware software protection are available from folks like Microsoft and others and that is going to be the basis to stop infiltration of thieves placing a virus on your computer that will result in an issue.

There on out, we must know that we are using a secure method in connecting to the Internet, especially corporate connections. 

Corporations use passwords and you know what we have already stated about those!  They also use tokens which generate certificates to gain access to the corporate database and all the wondrous company treasure, electronically stored. 

Secured by a password!

Corporate use of Device DNA is the answer and has been in use for decades by some of the largest corporations in the world and they do not advertise that they do so. 

Nor does the company that is behind the solution, state who their clients are, it is all very secure.  Only a few clients have admitted they use this logical method.

They are using an anonymous, invisible bullet resistant tube to connect both ends and allow secure data in motion.

If you wish to know more, then you have to ask.  Then, when you simply understand that all your fears and worries regarding using any device (BYOD) are not an issue anymore, you will be a user of Device DNA.  Inexpensive, secure and you will breathe easier at night, as will your IT Department.

I know, a cliffhanger, as you have to take the next step, call or email us and we shall discuss with you on how you will not have the burden of security just on your shoulders.

You will have been listening to the Straight Talking of RED TAGGED… NOW, take action!

We Are in the NOW and
KEEP YOU; in the KNOW…

www.commsmart-global.com

US: +1 (515) 200-7068

UK: 0207 1019247


Copyright 2018

No comments:

Post a Comment