2.2. Before, when you wanted to master (1) General Risks, (2) Executive-VIP-specific Risks, (3) Cybersecure Behaviors, and (4) Cybersecure Technologies (& corresponding Best Practices related to them) associated with Phones, Apps, Laptops/Desktops, and IoT Devices, you unlikely ever would….
Instead, you would:
1) Buy piecemeal solutions like an anti-virus not realizing it itself was unlikely secure.
Worse yet, we'd get a free one, not realizing it definitely wasn’t secure.
2) Leave our phone or computer unlocked and thus exposed to manipulation.
3) Download apps without paying attention to the quality of their source and its risks to our privacy, digital security, or physical security emanating from apps tracking our physical whereabouts and selling the information on the dark web.
4) Buy IoT devices with excitement about their potential of simplifying our life, not realizing they are a source of unmitigated privacy theft and an incubus of cyber(in)security.
5) Rarely focus on our device cybersecurity beyond the point of simply buying the device and then forgetting about maintaining it, or at the very least being lax/inconsistent about it.
6) Rarely approach our entire Device landscape from a 360-degree cybersecurity perspective (all device types in all areas of life: professional, personal, family), instead reactively dealing with a threat as it emerged (too little too late).
7) Rarely pay attention to our cyber(in)secure behaviors, mistakenly thinking that cybersecurity was a function of technology.
8) Mistakenly think that our personal and professional cybersecurity are the same thing (they’re not) or that our personal cybersecurity isn’t that important (it is to hackers trying to get to your organization through your personal cyber vulnerabilities).
9) At best delegate our Device cybersecurity to our CTO, not realizing that not even the best CTO can protect us from the 97% of breaches caused by cyber(in)secure behaviors and not realizing that our CTO cannot cybersecure even our technologies at home.
But now, you can use this simple Device Cybersecurity Training for Phones, Apps, Laptops/Desktops, and IoT Devices to: