Cybersecurity Awareness Month Series: Protect IT

Cybersecurity Awareness Month Series: Protect IT

Date: October 25, 2019
Tags: , , ,

By Steven Luczynski, Chief Information Security Officer, T-Rex Solutions.

As we near the end of National Cybersecurity Awareness Month, #BeCyberSmart, series, I’ll cover the last component of this year’s campaign theme.

PROTECT IT

Discussions about cybersecurity typically focus only on the “virtual” aspects of concerns and threats that originate through our interactions with our devices or online, such as emails and e-commerce. We should not forget that physical security is a key element in securing our data. No one wants to leave their work or personal laptop and/or cellphone unattended, so that it might be stolen, or misplaced so poorly it is just plain lost.

Our employees are taught the importance of not logging into their T-Rex devices then leaving them unattended, whether working at the office or another location. A brief moment away from a device is more than enough time for protected data to be exposed or a malicious file to be added. This practice also applies when teleworking from home since the obligation to protect our corporate and customer data remains the same.

Again, the applicability of this habit carries over to our personal devices. Locking a laptop/phone as you step away from them while you are away from home will go a long way in securing your personal information.

For more information on these topics, check out:

https://staysafeonline.org/stay-safe-online/identity-theft-fraud-cybercrime/reporting-cybercrime/

https://staysafeonline.org/stay-safe-online/securing-key-accounts-devices/securing-home-network/

Other articles in our Cybersecurity Awareness Month Series:
Intro to Cybersecurity Awareness Month
Cybersecurity Awareness Month Series: Secure IT
Cybersecurity Awareness Month: Secure IT with Passwords
Cybersecurity Awareness Series Finale


recently posted
Dr. Allen Harper on How T-Rex Helps Federal Agencies Meet the Zero Trust Challenge

Dr. Allen Harper on How T-Rex Helps Federal Agencies Meet the Zero Trust Challenge

The White House Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” calls for Federal agencies to adopt and implement zero trust architecture. In a recent interview with Washington Exec, T-Rex’s Executive Vice President of Cybersecurity Dr. Allen Harper discusses the […]

Enhancing a Security Hardening Validation Script through Sourcery AI

Enhancing a Security Hardening Validation Script through Sourcery AI

This blog post covers Sourcery’s integration with Visual Studio Code and Python, two standard tools included in security professionals’ development stacks. Sourcery is available at https://sourcery.ai and the Microsoft Visual Studio Code Extensions tab. To demonstrate Sourcery’s capabilities, we will […]

Exceed Cloud Migration Expectations with T-Rex and AWS

Exceed Cloud Migration Expectations with T-Rex and AWS

T-Rex continues to implement large scale cloud transitions with Amazon Web Services (AWS). Learn about the winning T-Rex/AWS collaboration on the 2020 Census:

Mission Critical Services – Essential for Every Program

Mission Critical Services – Essential for Every Program

Mission Critical Services (MCS) are a core offering for T-Rex. At its core, MCS centers around user experience (UX), ensuring that enterprise mission-critical programs are on track to successfully deliver and support the mission. MCS includes properly maintaining and supporting […]