Cybersecurity Awareness Month Series: Protect IT

Cybersecurity Awareness Month Series: Protect IT

Date: October 25, 2019
Tags: , , ,

By Steven Luczynski, Chief Information Security Officer, T-Rex Solutions.

As we near the end of National Cybersecurity Awareness Month, #BeCyberSmart, series, I’ll cover the last component of this year’s campaign theme.

PROTECT IT

Discussions about cybersecurity typically focus only on the “virtual” aspects of concerns and threats that originate through our interactions with our devices or online, such as emails and e-commerce. We should not forget that physical security is a key element in securing our data. No one wants to leave their work or personal laptop and/or cellphone unattended, so that it might be stolen, or misplaced so poorly it is just plain lost.

Our employees are taught the importance of not logging into their T-Rex devices then leaving them unattended, whether working at the office or another location. A brief moment away from a device is more than enough time for protected data to be exposed or a malicious file to be added. This practice also applies when teleworking from home since the obligation to protect our corporate and customer data remains the same.

Again, the applicability of this habit carries over to our personal devices. Locking a laptop/phone as you step away from them while you are away from home will go a long way in securing your personal information.

For more information on these topics, check out:

https://staysafeonline.org/stay-safe-online/identity-theft-fraud-cybercrime/reporting-cybercrime/

https://staysafeonline.org/stay-safe-online/securing-key-accounts-devices/securing-home-network/

Other articles in our Cybersecurity Awareness Month Series:
Intro to Cybersecurity Awareness Month
Cybersecurity Awareness Month Series: Secure IT
Cybersecurity Awareness Month: Secure IT with Passwords
Cybersecurity Awareness Series Finale


recently posted
Zero Trust Lift: Network Visibility and Analytics Maturity using Zeek

Zero Trust Lift: Network Visibility and Analytics Maturity using Zeek

Zeek is a proven open-source network visibility and analytics tool that you can leverage to increase your agency’s Network Visibility and Analytics Capability maturity under CISA’s Zero Trust Maturity Model Version 2. Zeek (https://zeek.org, formerly named Bro) is a network […]

T-Rex is Hiring at Hill Air Force Base

T-Rex is Hiring at Hill Air Force Base

Since 2016, T-Rex has been supporting large scale hybrid-cloud migrations and systems modernization, to include the successful deployment of the first-ever online U.S. Census in 2020. We are excited about expanding our IT Modernization services within the National Security market, […]

Secure by Design and Zero Trust: Integrating Supply Chain Risk Management with DevSecOps

Secure by Design and Zero Trust: Integrating Supply Chain Risk Management with DevSecOps

Agencies are seeking innovative ways to mature their Zero Trust posture. In this article, we have focused on improvements to your DevSecOps to increase maturity in two pillars: 1) Devices and Applications and 2) Workloads.

Protecting Government Apps and Workloads from Zero-Day Cyber Threats

Protecting Government Apps and Workloads from Zero-Day Cyber Threats

In April 2023, CISA released Zero Trust Maturity Model Version 2, which added a fourth security maturity level and reaffirmed application and workload cyber requirements. In this article we consider Application Threat Protections security levels within the Applications and Workloads […]