Security Cloud Privacy Tech
Cybersecurity Basics #11a - Risk Assessments Redux

Cybersecurity Basics #11a - Risk Assessments Redux

Mornings With Mark no. 0107

Watch the episode on YouTube

Join the discussion on LinkedIn

Share on Twitter

Bad Robot Transcript

What everybody how you doing today? I’m just a little weirdness in the title today. This is cyber. Security Basics 11. And the reason for that much money on YouTube is a hundred percent spot on I do not profess or put the proper context or practicing cybersecurity is a career or trying to get into it a few of risk assessments and penetration testing today.

We will view of risk assessment free stuff in because that’s not something that you would regularly do for individuals. So for risk assessment on a personal level. Level of risk assessment. Otherwise, we’re in trouble. I’m so when you go to cross the street, you normally look both ways depending on which country you’re going to look cross or the opposite if you were in England or New Zealand, Japan or I in awesome, right so or any other country that drives in last night, so the risk is really low at something happened to me and I’m going to walk across the street right now.

That’s why I don’t like to cross a crosswalk. So that’s a risk assessment on the personal side. When you come to the cyber world education isn’t there for individuals to let me know by email me at Market. CA you can adjust the permissions when you send information by email.

You should be doing a bit of a pop across most people’s radar when you download a file. Are you downloading it from of reputable? From some party download size file worth the risk. I know I’m getting from the risk assessment. Now. We don’t like us very well on a personal plane very well because there’s a lot of risk around them.

So people don’t remember increasing the risk that you’re facing and the reason you’re And the more places I can get underwear. I have my one password to unlock the password manager password for every site or app or service that I music the challenges is that word context in a personal setting of the situation in the complexities actually make a proper risk assessment.

So what ends up happening is you just click through whatever prompts are given to you. Now the team at Google that run the Chrome browser really really smart one of their their leaves on a porter and Conference and she quoted as saying how often people just flipped through the user dialogues that were from this site doesn’t have a proper certificate say they are a people to Seattle Carolina go to website and it was a shocking Lehigh was over Trump that’s thrown at you on your device or your computers and people just acknowledge it and go so from a risk assessment or the risk environment around the choice you’re being asked.

So when you install an app on Android and ask for a whole list of permissions, you should be doing an evaluation and assessment of the risk of that app having access to the network your photos to your contacts and everything is asking for a contacts or information. That’s a really small context.

Is there a vehicle coming this way? Either vehicle coming this way or some other rain Danger on both sides. What’s the equivalent for installing an app on your phone? For sharing something on social media. There isn’t one in it come down to a failure in the security community. So this is not a positive aspect of risk assessments on the personal side, even though it’s something that we should be doing all the time and I will look at people expose themselves to a lot of risk that there wouldn’t if they knew they were making is a lot of acceptance are implicitly accepting risk yourself to think about their you’re absolutely correct.

Classic one. Hit me up online login for everybody including our podcast. Hit me up audio streaming happy to tackle whatever topics around security and privacy and Technology. You guys are interested in have a fantastic day tomorrow. What everybody how you doing today? I’m just a little weirdness in the title today.

This is cyber. Security Basics 11. And the reason for that much money on YouTube is a hundred percent spot on I do not profess or put the proper context or practicing cybersecurity is a career or trying to get into it a few of risk assessments and penetration testing today.

We will view of risk assessment free stuff in because that’s not something that you would regularly do for individuals. So for risk assessment on a personal level. Level of risk assessment. Otherwise, we’re in trouble. I’m so when you go to cross the street, you normally look both ways depending on which country you’re going to look cross or the opposite if you were in England or New Zealand, Japan or I in awesome, right so or any other country that drives in last night, so the risk is really low at something happened to me and I’m going to walk across the street right now.

That’s why I don’t like to cross a crosswalk. So that’s a risk assessment on the personal side. When you come to the cyber world education isn’t there for individuals to let me know by email me at Market. CA you can adjust the permissions when you send information by email.

You should be doing a bit of a pop across most people’s radar when you download a file. Are you downloading it from of reputable? From some party download size file worth the risk. I know I’m getting from the risk assessment. Now. We don’t like us very well on a personal plane very well because there’s a lot of risk around them.

So people don’t remember increasing the risk that you’re facing and the reason you’re And the more places I can get underwear. I have my one password to unlock the password manager password for every site or app or service that I music the challenges is that word context in a personal setting of the situation in the complexities actually make a proper risk assessment.

So what ends up happening is you just click through whatever prompts are given to you. Now the team at Google that run the Chrome browser really really smart one of their their leaves on a porter and Conference and she quoted as saying how often people just flipped through the user dialogues that were from this site doesn’t have a proper certificate say they are a people to Seattle Carolina go to website and it was a shocking Lehigh was over Trump that’s thrown at you on your device or your computers and people just acknowledge it and go so from a risk assessment or the risk environment around the choice you’re being asked.

So when you install an app on Android and ask for a whole list of permissions, you should be doing an evaluation and assessment of the risk of that app having access to the network your photos to your contacts and everything is asking for a contacts or information. That’s a really small context.

Is there a vehicle coming this way? Either vehicle coming this way or some other rain Danger on both sides. What’s the equivalent for installing an app on your phone? For sharing something on social media. There isn’t one in it come down to a failure in the security community. So this is not a positive aspect of risk assessments on the personal side, even though it’s something that we should be doing all the time and I will look at people expose themselves to a lot of risk that there wouldn’t if they knew they were making is a lot of acceptance are implicitly accepting risk yourself to think about their you’re absolutely correct.

Classic one. Hit me up online login for everybody including our podcast. Hit me up audio streaming happy to tackle whatever topics around security and privacy and Technology. You guys are interested in have a fantastic day tomorrow.

More Content