Home » Liberty » The Prepper’s Guide to Cybersecurity

Olduvai
Click on image to purchase

Olduvai III: Catacylsm
Click on image to purchase

Post categories

Post Archives by Category

The Prepper’s Guide to Cybersecurity

How savvy are you about cybersecurity? Technology is ever-changing, and that alone can make it overwhelming. If you have put off learning how to protect your computer, however, I urge you change that ASAP. Preppers get a lot of information and products from the internet, so you’ll want to make sure to practice good cybersecurity so you don’t give away too much of your owninformation.

According to Ceasar Cerrudo, cybersecurity should be our biggest concern. He would know. He’s a professional hacker.

Cerrudo’s company, IOActive, provides hacking services to find vulnerabilities in order to improve cybersecurity. His predictions should be a wake-up call to get savvy about cybersecurity.

Some experts predict that by 2020 there will be 200 billion connected things. Cars, planes, homes, cities, and even animals are being connected. We are putting software everywhere. This is changing the way we live and how we behave and interact with the world around us. As technology becomes more and more deeply integrated into our lives, we become more and more dependent on it. But this dependence makes us vulnerable if technology fails.

Cerrudo goes on to point out:

I see the same problems over and over again. We are not getting better. And while we depend more and more on technology, technology is becoming more and more insecure.

In my experience, most technology is vulnerable and can be hacked.

Considering how our computers, phones, cars, home security systems, banking, appliances, pace-makers, insulin pumps, and more are becoming “connected”, privacy and security have never been more important.

Cyber Threats: What Are They?

Cyber threats come from hackers and scammers. Hackers will exploit vulnerabilities on your computer or other connected devices to gain access to your private information. They do this through malware. Scammers exploit human error, naivety, and opportunity. Scammers will use phishing emails, websites, malware, or other strategies to break into your device.

…click on the above link to read the rest of the article…

Olduvai IV: Courage
Click on image to read excerpts

Olduvai II: Exodus
Click on image to purchase

Click on image to purchase @ FriesenPress