Cybersecurity Awareness Month Series: Protect IT

Cybersecurity Awareness Month Series: Protect IT

Date: October 25, 2019
Tags: , , ,

By Steven Luczynski, Chief Information Security Officer, T-Rex Solutions.

As we near the end of National Cybersecurity Awareness Month, #BeCyberSmart, series, I’ll cover the last component of this year’s campaign theme.

PROTECT IT

Discussions about cybersecurity typically focus only on the “virtual” aspects of concerns and threats that originate through our interactions with our devices or online, such as emails and e-commerce. We should not forget that physical security is a key element in securing our data. No one wants to leave their work or personal laptop and/or cellphone unattended, so that it might be stolen, or misplaced so poorly it is just plain lost.

Our employees are taught the importance of not logging into their T-Rex devices then leaving them unattended, whether working at the office or another location. A brief moment away from a device is more than enough time for protected data to be exposed or a malicious file to be added. This practice also applies when teleworking from home since the obligation to protect our corporate and customer data remains the same.

Again, the applicability of this habit carries over to our personal devices. Locking a laptop/phone as you step away from them while you are away from home will go a long way in securing your personal information.

For more information on these topics, check out:

https://staysafeonline.org/stay-safe-online/identity-theft-fraud-cybercrime/reporting-cybercrime/

https://staysafeonline.org/stay-safe-online/securing-key-accounts-devices/securing-home-network/

Other articles in our Cybersecurity Awareness Month Series:
Intro to Cybersecurity Awareness Month
Cybersecurity Awareness Month Series: Secure IT
Cybersecurity Awareness Month: Secure IT with Passwords
Cybersecurity Awareness Series Finale


recently posted
T-Rex’s Zero Trust Reference Architecture: Multi-Cloud

T-Rex’s Zero Trust Reference Architecture: Multi-Cloud

Agencies should closely manage their Zero Trust program when considering a multi-cloud architecture to ensure a secure and zero trust compliant multi-cloud environment. Agencies can maximize these benefits: Agency maintains and improves Zero Trust Pillars Agency gains security capabilities Agency […]

More than Modernization: Digital Transformation Empowered by Agile Learning Culture

More than Modernization: Digital Transformation Empowered by Agile Learning Culture

Today’s avalanche of technology-driven change has made digital transformation imperative for Federal and civilian enterprises. At the heart of this transformation lies Agile Development, a methodology offering dynamic software development and delivery, which has emerged as the gold-standard for tech […]

Scott Wood Joins T-Rex as Vice President of Defense Programs

Scott Wood Joins T-Rex as Vice President of Defense Programs

T-Rex announced today that Scott Wood has joined the company as Vice President of Defense Programs. In this role, Mr. Wood will oversee T-Rex’s strategic growth and delivery of innovative solutions for the Department of Defense (DoD). Mr. Wood brings […]

Zero Trust Lift: Network Visibility and Analytics Maturity using Zeek

Zero Trust Lift: Network Visibility and Analytics Maturity using Zeek

Zeek is a proven open-source network visibility and analytics tool that you can leverage to increase your agency’s Network Visibility and Analytics Capability maturity under CISA’s Zero Trust Maturity Model Version 2. Zeek (https://zeek.org, formerly named Bro) is a network […]