Security Cloud Privacy Tech
Information Security vs. Cybersecurity

Information Security vs. Cybersecurity

Mornings With Mark no. 0059

Watch the episode on YouTube

Join the discussion on LinkedIn

Share on Twitter

Bad Robot Transcript

Good morning. How’s everybody doing today? Weird one for you? I’m a firm believer that names matter. And when I started way back as you can tell from the gray hair to never see my photo if you’re watching this life, we called cybersecurity information security information security not just cybersecurity, but over the last few years, there’s been a definite switch were information Securities were for less than once and what is commonly referred to now is cyber security.

Why does that matter? Who cares? It’s just a name, right? We all know what we’re talking about or and that’s really the challenge here is that I think there’s a substantial difference is all different types of security with physical security this operation is information security. Why does it matter is because information security directly refers to the information that you’re talking about? You want to see cure information out information about let’s talk about personal health information on medical records that is probably different forms as information is present in a digital system somewhere released pieces of it are the hospital.

My Jeep specialist will have parts of my record or stored information in a computer system perform somewhere, right this information has been recorded on the old-fashioned way in pen and paper filed away with all those folders, but that’s still the same. Sitting on that a lot of people inside the practitioners dealing with some point.

They have that information that are working on. It mentally Is wealth information security. What where is it in the physical form as well as in the digital form when you talk about cybersecurity you almost automatically exclude the physical form and that sort of what we’re biological form. So you start to focus purely on a technology-focused to the problem.

Very much. Does this all a big disservice because the information is the information regardless of where it’s information work throughout the entire. All you’re worried about cybersecurity you’re doing yourself MN information matter of I am at your house if you’re thinking cybersecurity and cyber is inside your house, but you don’t worry, but that means that you know, you could be in the most tray you can put your house in the most treacherous place ever think like Dora the Explorer level treachery never had kids or sat with kids independent young lady in the planet ever.

Let her live next to a volcano alligators that are actively trying to eat her this massive like that’s crazy. Show me pic from cyber security number of terrifying things concern because that’s not part of cyber. That’s just other places yet. You will come in from the outside of the house and vice-versa.

So you was information need to be protected. We focus purely on the digital. This is a people problem people people problem people. What’s this we very much so and I know I could we can’t turn back the tide at some point mass media marketing. We cybird all the things but I think as practitioners if people getting into even if we call it cyber-security, it is really information security need to look at every environment in which that information to be able to put proper safeguards and protections in place because there’s no sense in S256 with complex passphrases in all digital controls just to have somebody printed out and walk away with adversaries were to accidentally forget it on the bus or any number of ways that information could go into the wrong hands.

So it is truly information security physical as well as in the biological sure. I’m missing some remember digital physical and biological all these domains need the proper processes in place. How are you approaching a digital? Let me know in the comments or description down below as always by email to me at Mark and this is a discussion.

It’s on going on this episode 59 quickly wrap it up. Rack it up to your folks. Just gets better because I’m feeling all this content based on feedback. I’m getting from you. Don’t be shy. Good morning. How’s everybody doing today? Weird one for you? I’m a firm believer that names matter.

And when I started way back as you can tell from the gray hair to never see my photo if you’re watching this life, we called cybersecurity information security information security not just cybersecurity, but over the last few years, there’s been a definite switch were information Securities were for less than once and what is commonly referred to now is cyber security.

Why does that matter? Who cares? It’s just a name, right? We all know what we’re talking about or and that’s really the challenge here is that I think there’s a substantial difference is all different types of security with physical security this operation is information security. Why does it matter is because information security directly refers to the information that you’re talking about? You want to see cure information out information about let’s talk about personal health information on medical records that is probably different forms as information is present in a digital system somewhere released pieces of it are the hospital.

My Jeep specialist will have parts of my record or stored information in a computer system perform somewhere, right this information has been recorded on the old-fashioned way in pen and paper filed away with all those folders, but that’s still the same. Sitting on that a lot of people inside the practitioners dealing with some point.

They have that information that are working on. It mentally Is wealth information security. What where is it in the physical form as well as in the digital form when you talk about cybersecurity you almost automatically exclude the physical form and that sort of what we’re biological form. So you start to focus purely on a technology-focused to the problem.

Very much. Does this all a big disservice because the information is the information regardless of where it’s information work throughout the entire. All you’re worried about cybersecurity you’re doing yourself MN information matter of I am at your house if you’re thinking cybersecurity and cyber is inside your house, but you don’t worry, but that means that you know, you could be in the most tray you can put your house in the most treacherous place ever think like Dora the Explorer level treachery never had kids or sat with kids independent young lady in the planet ever.

Let her live next to a volcano alligators that are actively trying to eat her this massive like that’s crazy. Show me pic from cyber security number of terrifying things concern because that’s not part of cyber. That’s just other places yet. You will come in from the outside of the house and vice-versa.

So you was information need to be protected. We focus purely on the digital. This is a people problem people people problem people. What’s this we very much so and I know I could we can’t turn back the tide at some point mass media marketing. We cybird all the things but I think as practitioners if people getting into even if we call it cyber-security, it is really information security need to look at every environment in which that information to be able to put proper safeguards and protections in place because there’s no sense in S256 with complex passphrases in all digital controls just to have somebody printed out and walk away with adversaries were to accidentally forget it on the bus or any number of ways that information could go into the wrong hands.

So it is truly information security physical as well as in the biological sure. I’m missing some remember digital physical and biological all these domains need the proper processes in place. How are you approaching a digital? Let me know in the comments or description down below as always by email to me at Mark and this is a discussion.

It’s on going on this episode 59 quickly wrap it up. Rack it up to your folks. Just gets better because I’m feeling all this content based on feedback. I’m getting from you. Don’t be shy.

More Content