SlideShare a Scribd company logo
Here we are so many months into the COVID-19 pandemic with many of us still working from home full
time. I personally enjoy working from home and am fortunate to have a dedicated fully functional home
office. As an IT professional, I am always concerned with security so I have worked hard to make sure
my home setup does not compromise my personal security or others that entrust me with theirs. While
it is nice to feel safely ensconced in our homes during this time, we still need to be vigilant that nothing
in our camera view could breach that security.
The first line of defense is making sure technology maintains these security standards. My many Teams,
Zoom, and WebEx meetings all utilize the same camera. I have tested all of them to make sure those I
am teleconferencing with will not see anything personal about me or my family. It might seem
calculated but it is important to keep myself and my family safe.
I have noticed many who do not seem as concerned with instituting this type of security. Yes, working
from home has made the work environment much more relaxed, but one should not have a false sense
of security. We are still professionals and should maintain that attitude. When taking a meeting with
your colleagues or potential clients do you really want them to see your unmade bed in the
background? It only takes a few minutes but take that time to view what others will see. Is what they
are seeing of your personal space the image you want to project?
The most amazing thing I have seen is that even people who spend their lives on camera such as
newscasters, politicians, executives, and others who are now broadcasting from home are oblivious to
what they are showing the world audience. There are many in law enforcement and other fields who
will not have a social media presence due to security concerns. Yet, just a few weeks ago I watched an
interview with a former head of a national law enforcement department whose background contained
many pictures of his family in clear camera site. Why would someone in his field choose to show the
world such personal information? I hope he has no bounty on his head because he just compromised his
family.
I encountered another security issue when someone on Facebook showed a picture of a plant they had
just purchased for their desk. Unfortunately, the picture of the plant was in front of their screen showing
the company email system along with incoming messages. Zoom in on that image and you can see the
inbox identifying personal information that should not be public knowledge. Another example is a
meeting I attended where a person had their IP address in full view. The IP address had no place in the
conversation for this meeting but it was in clear site for anyone to take note. I also know that this
person works for a company that has a policy of obscuring IP addresses in open spaces within company
walls.
Maybe I have watched too much Netflix during this pandemic, but I am well aware that industrial
espionage is real. These people are highly respected, smart professionals that have deep knowledge of
their fields, yet somehow working from home has given people a false sense of security. Companies
have spent millions to protect their systems and their networks only to have their employees
compromise it due to their tunnel vision. Professionals need to be as vigilant at home as they are in the
workplace. It is imperative for companies to expect the same security procedures and protocols for the
home office.
As we continue to move to a remote workforce, it will be important for people to think before letting
strangers into their home. Going on a video call is the same as unlocking your door and letting a stranger
into your home. Think before going on that video call. Make sure you have nothing to compromise your
security. Scan your environment and notice any items that you do not want seen.
Security is everyone’s responsibility whether working in the office or from home. Think security always,
be smart and stay safe.

More Related Content

What's hot

Computer safety
Computer safetyComputer safety
Computer safety
ahentz
 
BlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || KeynoteBlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || Keynote
BlueHat Security Conference
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
Rajesh Soundararajan
 
Final project CTS 125-800
Final project CTS 125-800Final project CTS 125-800
Final project CTS 125-800
Stephanie10Hernandez12
 
Digital Footprints - NDP
Digital Footprints - NDPDigital Footprints - NDP
Digital Footprints - NDP
miawalsh
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
SearchLock
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
Ian Krieger
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentation
Casey McDaniel
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
Shubham Gupta
 
Internet safety
Internet safetyInternet safety
Internet safety
lindes dominguez
 
Protecting young-children-online-power point-presentation-security
Protecting young-children-online-power point-presentation-securityProtecting young-children-online-power point-presentation-security
Protecting young-children-online-power point-presentation-security
Mohamed ElGabry
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
PantegoChristian
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
bgmartinez1971
 
InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015
Ryan Renicker CFA
 
Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
International School Manila Elementary
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
Amanda lee
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
Lookout
 
Computer security
Computer securityComputer security
Computer security
Ben-Alt
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
Maria Petropulos
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
lorrflores
 

What's hot (20)

Computer safety
Computer safetyComputer safety
Computer safety
 
BlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || KeynoteBlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || Keynote
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
 
Final project CTS 125-800
Final project CTS 125-800Final project CTS 125-800
Final project CTS 125-800
 
Digital Footprints - NDP
Digital Footprints - NDPDigital Footprints - NDP
Digital Footprints - NDP
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentation
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Protecting young-children-online-power point-presentation-security
Protecting young-children-online-power point-presentation-securityProtecting young-children-online-power point-presentation-security
Protecting young-children-online-power point-presentation-security
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint Internet Safety for Children Powerpoint
Internet Safety for Children Powerpoint
 
InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015InfraGard Cyber Tips: October, 2015
InfraGard Cyber Tips: October, 2015
 
Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Computer security
Computer securityComputer security
Computer security
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 

Similar to False sense of security

Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
Jesus Rances
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
Jamie Proctor-Brassard
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
OMNIRISC SECURITY SERVICES
 
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Dana Gardner
 
disscussion reply to the question asked from students minimum words .docx
disscussion reply to the question asked from students minimum words .docxdisscussion reply to the question asked from students minimum words .docx
disscussion reply to the question asked from students minimum words .docx
jameywaughj
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
Lookout
 
1 A company should evaluate there flow of information and departmen.docx
1 A company should evaluate there flow of information and departmen.docx1 A company should evaluate there flow of information and departmen.docx
1 A company should evaluate there flow of information and departmen.docx
marilynnhoare
 
Security
SecuritySecurity
Security
Bob Cherry
 
Autisable com-2020-05-13-cybersecurity-matters-
Autisable com-2020-05-13-cybersecurity-matters-Autisable com-2020-05-13-cybersecurity-matters-
Autisable com-2020-05-13-cybersecurity-matters-
Saad Ahmad
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
Mirza Ćutuk
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
alvindalejoyosa1
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter Cyber Security
 
Internet safety
Internet safetyInternet safety
Internet safety
dsansford
 
Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdf
Fiyona Nourin
 
Freedom of Speech
Freedom of Speech Freedom of Speech
Freedom of Speech
jarettokendiary
 
Use Access Control Systems?
Use Access Control Systems?Use Access Control Systems?
Use Access Control Systems?
electricgatelocksstudy77
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
alicelagajino
 
portfolio.docx
portfolio.docxportfolio.docx
portfolio.docx
DasolGaming
 
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy ExpertInterview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
Muhammad Khan
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
Blake Carver
 

Similar to False sense of security (20)

Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
 
disscussion reply to the question asked from students minimum words .docx
disscussion reply to the question asked from students minimum words .docxdisscussion reply to the question asked from students minimum words .docx
disscussion reply to the question asked from students minimum words .docx
 
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
 
1 A company should evaluate there flow of information and departmen.docx
1 A company should evaluate there flow of information and departmen.docx1 A company should evaluate there flow of information and departmen.docx
1 A company should evaluate there flow of information and departmen.docx
 
Security
SecuritySecurity
Security
 
Autisable com-2020-05-13-cybersecurity-matters-
Autisable com-2020-05-13-cybersecurity-matters-Autisable com-2020-05-13-cybersecurity-matters-
Autisable com-2020-05-13-cybersecurity-matters-
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdf
 
Freedom of Speech
Freedom of Speech Freedom of Speech
Freedom of Speech
 
Use Access Control Systems?
Use Access Control Systems?Use Access Control Systems?
Use Access Control Systems?
 
Empowerment Technology Lesson 2
Empowerment Technology Lesson 2Empowerment Technology Lesson 2
Empowerment Technology Lesson 2
 
portfolio.docx
portfolio.docxportfolio.docx
portfolio.docx
 
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy ExpertInterview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 

More from BLeo0001

Sandy to Migrants; How Preparedness brings Hope!.pdf
Sandy to Migrants; How Preparedness brings Hope!.pdfSandy to Migrants; How Preparedness brings Hope!.pdf
Sandy to Migrants; How Preparedness brings Hope!.pdf
BLeo0001
 
One Less Chore
One Less ChoreOne Less Chore
One Less Chore
BLeo0001
 
Truth and Confidence
Truth and ConfidenceTruth and Confidence
Truth and Confidence
BLeo0001
 
The rules
The rulesThe rules
The rules
BLeo0001
 
The real world
The real worldThe real world
The real world
BLeo0001
 
How We Deal with Emotionally Disturbed People
How We Deal with Emotionally Disturbed PeopleHow We Deal with Emotionally Disturbed People
How We Deal with Emotionally Disturbed People
BLeo0001
 
The unmotivated employed
The unmotivated employedThe unmotivated employed
The unmotivated employed
BLeo0001
 
When is a fish story not a fish story
When is a fish story not a fish storyWhen is a fish story not a fish story
When is a fish story not a fish story
BLeo0001
 
Designing the Optimum Contact Center for Your Community Health Center
Designing the Optimum Contact Center for Your Community Health CenterDesigning the Optimum Contact Center for Your Community Health Center
Designing the Optimum Contact Center for Your Community Health Center
BLeo0001
 
Technology Workgroup Goals And Charter
Technology Workgroup Goals And CharterTechnology Workgroup Goals And Charter
Technology Workgroup Goals And Charter
BLeo0001
 

More from BLeo0001 (10)

Sandy to Migrants; How Preparedness brings Hope!.pdf
Sandy to Migrants; How Preparedness brings Hope!.pdfSandy to Migrants; How Preparedness brings Hope!.pdf
Sandy to Migrants; How Preparedness brings Hope!.pdf
 
One Less Chore
One Less ChoreOne Less Chore
One Less Chore
 
Truth and Confidence
Truth and ConfidenceTruth and Confidence
Truth and Confidence
 
The rules
The rulesThe rules
The rules
 
The real world
The real worldThe real world
The real world
 
How We Deal with Emotionally Disturbed People
How We Deal with Emotionally Disturbed PeopleHow We Deal with Emotionally Disturbed People
How We Deal with Emotionally Disturbed People
 
The unmotivated employed
The unmotivated employedThe unmotivated employed
The unmotivated employed
 
When is a fish story not a fish story
When is a fish story not a fish storyWhen is a fish story not a fish story
When is a fish story not a fish story
 
Designing the Optimum Contact Center for Your Community Health Center
Designing the Optimum Contact Center for Your Community Health CenterDesigning the Optimum Contact Center for Your Community Health Center
Designing the Optimum Contact Center for Your Community Health Center
 
Technology Workgroup Goals And Charter
Technology Workgroup Goals And CharterTechnology Workgroup Goals And Charter
Technology Workgroup Goals And Charter
 

Recently uploaded

Confidence is Key: Fashion for Women Over 50
Confidence is Key: Fashion for Women Over 50Confidence is Key: Fashion for Women Over 50
Confidence is Key: Fashion for Women Over 50
miabarn9
 
快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样
快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样
快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样
ubopub
 
Calendario 2024 mensual anual documento A4 multicolor pastel imprimible bla...
Calendario 2024 mensual  anual  documento A4 multicolor pastel imprimible bla...Calendario 2024 mensual  anual  documento A4 multicolor pastel imprimible bla...
Calendario 2024 mensual anual documento A4 multicolor pastel imprimible bla...
ValentinoRueda
 
Capsule Wardrobe Women: A document show
Capsule Wardrobe Women:  A document showCapsule Wardrobe Women:  A document show
Capsule Wardrobe Women: A document show
mustaphaadeyemi08
 
Biography and career history of Bruno Amezcua
Biography and career history of Bruno AmezcuaBiography and career history of Bruno Amezcua
Biography and career history of Bruno Amezcua
Bruno Amezcua
 
Self-Discipline: The Secret Weapon for Certain Victory
Self-Discipline: The Secret Weapon for Certain VictorySelf-Discipline: The Secret Weapon for Certain Victory
Self-Discipline: The Secret Weapon for Certain Victory
bluetroyvictorVinay
 
Types of Garage Doors Explained: Energy Efficiency, Style, and More
Types of Garage Doors Explained: Energy Efficiency, Style, and MoreTypes of Garage Doors Explained: Energy Efficiency, Style, and More
Types of Garage Doors Explained: Energy Efficiency, Style, and More
Affordable Garage Door Repair
 
MISS TEEN LUCKNOW 2024 - WINNER ASIYA 2024
MISS TEEN LUCKNOW 2024 - WINNER ASIYA 2024MISS TEEN LUCKNOW 2024 - WINNER ASIYA 2024
MISS TEEN LUCKNOW 2024 - WINNER ASIYA 2024
DK PAGEANT
 
一比一原版(UoL毕业证)伦敦大学毕业证如何办理
一比一原版(UoL毕业证)伦敦大学毕业证如何办理一比一原版(UoL毕业证)伦敦大学毕业证如何办理
一比一原版(UoL毕业证)伦敦大学毕业证如何办理
qghuhwa
 
Analysis and Assessment of Gateway Process – HemiSync(1).PDF
Analysis and Assessment of Gateway Process – HemiSync(1).PDFAnalysis and Assessment of Gateway Process – HemiSync(1).PDF
Analysis and Assessment of Gateway Process – HemiSync(1).PDF
JoshuaDagama1
 
Insanony: Watch Instagram Stories Secretly - A Complete Guide
Insanony: Watch Instagram Stories Secretly - A Complete GuideInsanony: Watch Instagram Stories Secretly - A Complete Guide
Insanony: Watch Instagram Stories Secretly - A Complete Guide
Trending Blogers
 
一比一原版塔夫斯大学毕业证Tufts成绩单一模一样
一比一原版塔夫斯大学毕业证Tufts成绩单一模一样一比一原版塔夫斯大学毕业证Tufts成绩单一模一样
一比一原版塔夫斯大学毕业证Tufts成绩单一模一样
stgq9v39
 
一比一原版(McGill毕业证书)麦吉尔大学毕业证如何办理
一比一原版(McGill毕业证书)麦吉尔大学毕业证如何办理一比一原版(McGill毕业证书)麦吉尔大学毕业证如何办理
一比一原版(McGill毕业证书)麦吉尔大学毕业证如何办理
lyurzi7r
 

Recently uploaded (13)

Confidence is Key: Fashion for Women Over 50
Confidence is Key: Fashion for Women Over 50Confidence is Key: Fashion for Women Over 50
Confidence is Key: Fashion for Women Over 50
 
快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样
快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样
快速办理(加拿大CBU毕业证书)卡普顿大学毕业证毕业完成信一模一样
 
Calendario 2024 mensual anual documento A4 multicolor pastel imprimible bla...
Calendario 2024 mensual  anual  documento A4 multicolor pastel imprimible bla...Calendario 2024 mensual  anual  documento A4 multicolor pastel imprimible bla...
Calendario 2024 mensual anual documento A4 multicolor pastel imprimible bla...
 
Capsule Wardrobe Women: A document show
Capsule Wardrobe Women:  A document showCapsule Wardrobe Women:  A document show
Capsule Wardrobe Women: A document show
 
Biography and career history of Bruno Amezcua
Biography and career history of Bruno AmezcuaBiography and career history of Bruno Amezcua
Biography and career history of Bruno Amezcua
 
Self-Discipline: The Secret Weapon for Certain Victory
Self-Discipline: The Secret Weapon for Certain VictorySelf-Discipline: The Secret Weapon for Certain Victory
Self-Discipline: The Secret Weapon for Certain Victory
 
Types of Garage Doors Explained: Energy Efficiency, Style, and More
Types of Garage Doors Explained: Energy Efficiency, Style, and MoreTypes of Garage Doors Explained: Energy Efficiency, Style, and More
Types of Garage Doors Explained: Energy Efficiency, Style, and More
 
MISS TEEN LUCKNOW 2024 - WINNER ASIYA 2024
MISS TEEN LUCKNOW 2024 - WINNER ASIYA 2024MISS TEEN LUCKNOW 2024 - WINNER ASIYA 2024
MISS TEEN LUCKNOW 2024 - WINNER ASIYA 2024
 
一比一原版(UoL毕业证)伦敦大学毕业证如何办理
一比一原版(UoL毕业证)伦敦大学毕业证如何办理一比一原版(UoL毕业证)伦敦大学毕业证如何办理
一比一原版(UoL毕业证)伦敦大学毕业证如何办理
 
Analysis and Assessment of Gateway Process – HemiSync(1).PDF
Analysis and Assessment of Gateway Process – HemiSync(1).PDFAnalysis and Assessment of Gateway Process – HemiSync(1).PDF
Analysis and Assessment of Gateway Process – HemiSync(1).PDF
 
Insanony: Watch Instagram Stories Secretly - A Complete Guide
Insanony: Watch Instagram Stories Secretly - A Complete GuideInsanony: Watch Instagram Stories Secretly - A Complete Guide
Insanony: Watch Instagram Stories Secretly - A Complete Guide
 
一比一原版塔夫斯大学毕业证Tufts成绩单一模一样
一比一原版塔夫斯大学毕业证Tufts成绩单一模一样一比一原版塔夫斯大学毕业证Tufts成绩单一模一样
一比一原版塔夫斯大学毕业证Tufts成绩单一模一样
 
一比一原版(McGill毕业证书)麦吉尔大学毕业证如何办理
一比一原版(McGill毕业证书)麦吉尔大学毕业证如何办理一比一原版(McGill毕业证书)麦吉尔大学毕业证如何办理
一比一原版(McGill毕业证书)麦吉尔大学毕业证如何办理
 

False sense of security

  • 1. Here we are so many months into the COVID-19 pandemic with many of us still working from home full time. I personally enjoy working from home and am fortunate to have a dedicated fully functional home office. As an IT professional, I am always concerned with security so I have worked hard to make sure my home setup does not compromise my personal security or others that entrust me with theirs. While it is nice to feel safely ensconced in our homes during this time, we still need to be vigilant that nothing in our camera view could breach that security. The first line of defense is making sure technology maintains these security standards. My many Teams, Zoom, and WebEx meetings all utilize the same camera. I have tested all of them to make sure those I am teleconferencing with will not see anything personal about me or my family. It might seem calculated but it is important to keep myself and my family safe. I have noticed many who do not seem as concerned with instituting this type of security. Yes, working from home has made the work environment much more relaxed, but one should not have a false sense of security. We are still professionals and should maintain that attitude. When taking a meeting with your colleagues or potential clients do you really want them to see your unmade bed in the background? It only takes a few minutes but take that time to view what others will see. Is what they are seeing of your personal space the image you want to project? The most amazing thing I have seen is that even people who spend their lives on camera such as newscasters, politicians, executives, and others who are now broadcasting from home are oblivious to what they are showing the world audience. There are many in law enforcement and other fields who will not have a social media presence due to security concerns. Yet, just a few weeks ago I watched an interview with a former head of a national law enforcement department whose background contained many pictures of his family in clear camera site. Why would someone in his field choose to show the world such personal information? I hope he has no bounty on his head because he just compromised his family. I encountered another security issue when someone on Facebook showed a picture of a plant they had just purchased for their desk. Unfortunately, the picture of the plant was in front of their screen showing the company email system along with incoming messages. Zoom in on that image and you can see the inbox identifying personal information that should not be public knowledge. Another example is a meeting I attended where a person had their IP address in full view. The IP address had no place in the conversation for this meeting but it was in clear site for anyone to take note. I also know that this person works for a company that has a policy of obscuring IP addresses in open spaces within company walls. Maybe I have watched too much Netflix during this pandemic, but I am well aware that industrial espionage is real. These people are highly respected, smart professionals that have deep knowledge of their fields, yet somehow working from home has given people a false sense of security. Companies have spent millions to protect their systems and their networks only to have their employees compromise it due to their tunnel vision. Professionals need to be as vigilant at home as they are in the workplace. It is imperative for companies to expect the same security procedures and protocols for the home office. As we continue to move to a remote workforce, it will be important for people to think before letting strangers into their home. Going on a video call is the same as unlocking your door and letting a stranger
  • 2. into your home. Think before going on that video call. Make sure you have nothing to compromise your security. Scan your environment and notice any items that you do not want seen. Security is everyone’s responsibility whether working in the office or from home. Think security always, be smart and stay safe.