Wednesday, March 3, 2021
CybersecFill
Advertisement
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us
No Result
View All Result
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us
No Result
View All Result
CybersecFill
No Result
View All Result
Home security tips

The Human Firewall – Answer to Your Security Problems

Cybersecfill by Cybersecfill
January 14, 2019
in security tips
0
Human Firewall
Share on FacebookShare on Twitter

The Human Firewall

I came across a video by Rob May on the human firewall and it was quite interesting so I requested to write a blog about it.

Humans are the weakest link in cybersecurity, this we all know already.

The anchor started by making the listeners vulnerable with a simple question “What is your porn stars name” and he said “take the name of your first pets and the name of the roads that you lived in when you were a child”. I am sure more than 70% of the listeners fell for this.

He asked them to turn to their neighbor and tell them their answers. Guess what, they just successfully gave a stranger some vital information about their selves.

It was amusing to the listeners and it kept me wondering about what happens on social media. You see a post that reads “reply with your location to meet people close to you” “Comment with your date of birth” and so many others.

He said “it’s amazing and that’s why when you post this on Facebook, so many people engage with it.

 

This information is sometimes used for password retrievals and banking. We are being tricked like this all the time and your technical know-how of cybersecurity may not even help you through this.

“Every 3 seconds, somebody suffers from Identity theft because of cyber-crime” Cyber crime is a huge problem that affects everyone of us.

It’s time to not just invest in traditional security (software, firewall and other security technologies) but to invest in people because our biggest risk and our biggest line of defense are the People-Human Firewall.

How much do you value your security? What is your data security worth?

People willingly give information more than ever, no thanks to social media.

Everyone needs to be aware of cybersecurity. We should talk about cybersecurity scams; it reduces the chances of people falling for them.

 

IT IS TIME TO INVEST IN PEOPLE,IT IS TIME TO INVEST IN THE HUMAN FIREWALL.

 

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

Tags: cybersecurityFirewal.GoogleHuman firewallOnline security
Cybersecfill

Cybersecfill

An independent Nigeria cybersecurity blog aimed at sharing cybersecurity news, articles ,blog and opinins.

Next Post
Windows 7 – Support to End Soon

Windows 7 - Support to End Soon

0 0 vote
Article Rating
Login
guest
guest
0 Comments
Inline Feedbacks
View all comments

Subscribe

Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!

  • Trending
  • Comments
  • Latest
credit card cloning

How Credit/Debit Cards are Cloned / Preventing Card Cloning

December 26, 2019
Wifi 6 Security

Did Wi-Fi 6 come with an Improvement In Security?

May 13, 2019
Nationa Cybersecurity Strategy

A Review of the Nigeria National Cybersecurity Strategy

July 1, 2019
Wireless Access Point

How To Secure Your Wireless Access Point (WAP)

August 3, 2019
Facebook

Facebook’s New Settings Allows Hackers To Easily Pentest Facebook,Instagram Mobile Applications

8
Nationa Cybersecurity Strategy

A Review of the Nigeria National Cybersecurity Strategy

6
Cybersecurity Jobs

Cybersecurity Jobs – You can create your own Cybersecurity Role

4
open Source intelligence tools

Open Source Intelligence tools – OSINT

4
5G Dangers: What are the Cybersecurity implications?

5G Dangers: What are the Cybersecurity implications?

March 1, 2021
Key Differences Between Firewall And Antivirus

Key Differences Between Firewall And Antivirus

February 27, 2021
Cybersecurity for Remote Workers: 8 ways to work safer…

Cybersecurity for Remote Workers: 8 ways to work safer…

February 24, 2021
Cloud Account Hijacking

Cloud Account Hijacking

February 22, 2021

Recommended

5G Dangers: What are the Cybersecurity implications?

5G Dangers: What are the Cybersecurity implications?

March 1, 2021
Key Differences Between Firewall And Antivirus

Key Differences Between Firewall And Antivirus

February 27, 2021
Cybersecurity for Remote Workers: 8 ways to work safer…

Cybersecurity for Remote Workers: 8 ways to work safer…

February 24, 2021
Cloud Account Hijacking

Cloud Account Hijacking

February 22, 2021

© 2020 CybersecFill. All Rights Reserved.

No Result
View All Result
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us

© 2020 CybersecFill. All Rights Reserved.

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply