Our consumption of mass media is intriguing. With social media, online videos and audio, plus traditional media, we are rich for choice. Heated discussions often arise from differing opinions and rather than selectively ignore what offends us, we obsessively focus. A recent social media post where the author complained about other posts was akin to someone that objected to a radio station but continued to listen. No doubt others would object to the objecting post! One wonders why we continually indulge in something we object to when choices abound. When attacks become ad hominem, it is time to move on.
Reports indicate four Queensland schools will trial a British software product, “eSafe Global”, to combat cyberbullying. We are progressing, but the journey is long. The application, installed on school devices, monitors activities for specific behaviour. While this implementation assists during school hours and somewhat after hours, it relies on exclusive use of the device. Students also use privately owned devices such as phones, tablets, laptops, and family computers which are likely not included. How do we secure this gap without unnecessary intrusion? How do we address what is fundamentally a people problem, exacerbated by technology, using yet another technical control?
During my school years, I was bullied frequently but my salvation was escaping it by going home when the bell rang. While some abuse occurred away from school, it was minor compared to what children and even some adults face today. Online, they are constantly subjected to abuse without respite. Toxic schoolyards and workplaces are now part of our homes. Abstinence has minimal effectiveness when FOMO keeps us connected. We conveniently blame technology, but bullying is a people problem now exacerbated by technology. We need a fundamental change to mindset and culture beyond technical controls. Virtual actions cause physiological harm.
Our cyber security responsibilities are a “Cyber Grenade” we must carry whether we are aware or not. The more information assurance responsibility we bear, the larger this Cyber Grenade becomes. Its detonation is a matter of “when”, not “if”, and we cannot predict this eventuality; we may only prepare for it. Your Cyber Grenade impacts others and theirs impacts you; the degree is subjective. This situation is manageable, and we can help. Become aware of your responsibility, take reasonable steps to prevent it from happening, have plans to manage the impact, and become able to recover and resume normal operations.
If Cloud is part of your business strategy, you need CASB. A Cloud Access Security Broker sits between you and your cloud services, providing the security and management needed to safeguard your information. Whether using agents, agentless, or a hybrid approach, CASB delivers services such as device profiling, encryption, authentication, malware detection, and usage analysis. You can control access to sanctioned applications and limit unsanctioned usage like Shadow IT. Compliance considerations, such as GDPR, are important factors driving CASB adoption. Consider use cases over technical architecture when selecting solutions. CASB is an important layer in your defence in depth strategy.
It sounds odd, but I have had few truly negative experiences. Whether a misfortune of my own or that of someone else, a lesson has presented itself. Some lessons were instant while others took years tempered by maturity to be understood. Leadership is no different. I have had truly great leaders to emulate but have learned more from the shortcomings of leaders who were not so great. Even their negative experiences eventually provided a positive outcome for me, even if they are still learning from them. Mindlessly stating “forgive and forget” yields no advancement. Forgiving benefits most; forgetting benefits few.
In an era of apparent cyber narcissism, one wonders why we seek virtual validation through social media to measure our worth. We obsess over the number of “Likes”, comments on, and shares of our posts without realising those we seek validation from are likely seeking reciprocity. Imagine being someone who considers their holiday a failure due to minimal “Likes” on their Instagram and Facebook posts. We should not live for the arbitrary mouse clicks or screen taps of anyone else. We have forgotten to experience life in analogue, now living digitally vicarious through an online persona. Be your best offline.