The Cyber Whisperer
View in browser
CyberAdvisor banner header 2021

February Letter

The Cyber Whisperer

Hi there, 

February's letter offers an insight into the essence of what TDS stands for: delivering an ecosystem that provides optimal privacy and security across all your devices, at any place and any time.

 

To do this we distill almost everything we know into what we call 'the fundamentals' — the indispensable pillars akin to a stool's critical legs. Without them, fulfilling our mission to construct a robust ecosystem of privacy and cybersecurity would be impossible.

 

✓ These cybersecurity fundamentals stand as cornerstones, crucial in our quest to establish a formidable, unshakeable base within the constantly shifting sands of the digital security landscape.

 

First, here's a reader's guide to what follows next:

Outline - How we build an ecosystem of privacy and cybersecurity for our clients

  • Protection must be optimized in real time, all the time.
  • Defenses must work across all devices.
  • Security must be effective on any network, public or private.

Step #1 - Find where the risk resides - 'The Three Primary Attack Surfaces.'

 

Step #2 - Determine strategy to protect the 'Attack Surfaces' from cybercrime, ID theft, and loss of personal information - 'The Four Fundamentals.'

 

Step #3 - Identify best-in class solutions for provisioning  'The Four Fundamentals' and implementing strategy with real-time tactical optimization 24/7.

Before we explore the fundamentals in depth, let’s first trace the path that led us here. With this we aspire to construct a vivid 'mind’s-eye' view, enriching the reader’s context and sharpening their critical thinking skills.

 

Discovering the Fundamentals of Cybersecurity and Privacy

 

Our identification of the fundamentals began with an 'outside-in' approach, starting from the user's interaction with the internet. This perspective enabled us to pinpoint cyber risk at its core, and we found it residing in three distinct areas. By concentrating on these critical junctures of digital vulnerability, we've been able to articulate the essential fundamentals required to realize the vision of a comprehensive ecosystem of privacy and cybersecurity.

 

✓ Our analysis and insights reveal three primary vulnerabilities critical for anyone navigating the internet. These vulnerabilities are the epicenters of cyber threats, underpinning the vast majority of successful hacks and cyberattacks. We've termed these critical points "The Three Primary Attack Surfaces."

 

The Three Primary Attack Surfaces for Cybercrime

 

It's simple, if not intuitive, but flagging these three culprits focuses our attention and creates a vivid visual in one's mind, which is important for abstract issues like cyber. With this intelligence we can effectively meet the risk where it lives.

 

1) EMAIL –

The #1 point of entry for cybercriminals and online fraudsters is email. Phishing, ransomware, spying, key-logging, and many other exploits start with an email. AI in cybercrime is increasing the risks inherent in email, and we need to be vigilant and on our toes with our inboxes more than ever.

 

2) DEVICES –

Computers, laptops, phones, pads, and tablets are all vulnerable to viruses, data loss, malicious intruders, and much more.

 

3) NETWORKS –

More and more, home and office Wi-Fi and public Wi-Fi like cafes, hotels, and airports are considered “honeypots” by hackers.

 

✓Understanding the risks inherent in 'The Three Primary Attack Surfaces' guided us in developing 'The Four Fundamentals,' which constitute the indispensable pillars of a universally effective privacy and digital security ecosystem—seamlessly operational across all devices and networks, ensuring protection at every moment and location.

 

So, finally, here are "The Four Fundamentals of Cybersecurity for Life."

 

The Four Fundamentals of “Cybersecurity for Life”

 

How to mitigate cyber risk and ID theft to the margin by creating an ecosystem of privacy and cybersecurity.

 

The Four Fundamentals -

  1. Privatize your personal email.
  2. Protect your internet-connected devices.
  3. Secure your network.
  4. Use a VPN every day.

✓ More details follow below and illustrate how TDS solves these four fundamentals for our clients using advanced cybersecurity solutions.

 

1) EMAIL – Privatize Email

  • Microsoft 365 tenant with MS Entra security controls.
  • Private Domain Name Registration and Domain Name Servers – GoDaddy.
  • Email Boxes – Microsoft 365.
  • Modest one-time setup fee.
  • We act as Admin and TDS is  your first contact, not Microsoft.

* Benefits – email activities are off the grid of “free” email and embolden “digital identity.” Security controls and intelligence with AI via Microsoft’s email security platform. 

 

2) DEVICES – Protect Your Devices

  • For Windows and Mac Computers
  • Enterprise-level EPP by WithSecure – Endpoint protection - $89/yr. per device
  • Antivirus
  • Data Loss Protection
  • Intruder Protection, etc.
  • Real-time optimization

* Benefits – a comprehensive, unified “full-stack” of endpoint protection to provide protection 24/7 with real-time optimization.

 

3) NETWORKS – Secure Your Network

  • This solution represents a generational leap in cybersecurity technology and reflects the "state-of-the-science" in IT security today.
  • Managed Network Security service by TDS via ControlOne SD-WAN / SASE Zero-trust Network Platform.
    For fixed-networks (home, office, etc.) - the ControlOne “security appliance” for onsite full network, Wi-Fi, all connected devices, and “things” - $2,550/yr.
  • Remote networks and public Wi-Fi - ControlOne “agent software” for Windows and Mac laptops and iOS - $249/yr. for customers with the onsite fixed-network protection above, or $419/yr. for “agent only” customers.

* Benefits – a comprehensive and unified platform for network security

Including firewall and VPN “as-a-service”, off the public internet via a private

“Point of Presence” or “POP,” also called the “Gateway.” Always on zero-trust

state of security, identity-based access controls, AV at the gateway, DDoS protection, content and DNS filtering, and much more.  See the illustration below:

The image above is a schematic of how the Managed Network Security by TDS works. On the left is a fixed-site network, and on the right is a user with mobile devices connected to a remote network, like public Wi-Fi, Starbucks, etc.

 

✓ The schematic above of our Managed Network Security service represents how SD-WAN / SASE Zero-trust Network Protection is comprehensive, location independent, and yet unified for a holistic solution that is seamless to the user.  This technology represent a generational leap in IT security systems.

My view - The Cyber Plague and a world of new risks

 

As we step into 2024 and beyond, it's clear that we've crossed a pivotal threshold in the realm of cyber vulnerabilities. The fusion of artificial intelligence and escalating geo-political tensions is not just increasing the number of cyber-attacks; it's also enhancing their complexity. This evolution in cyber threats is set to revolutionize our understanding of risk management, challenging its very foundations. The repercussions of this shift will be widespread, affecting individuals and large corporations alike, leaving no demographic untouched. The most alarming aspect? Our adversaries are exceptionally well-prepared and equipped. Backed by substantial investments over recent years, a spectrum of threats—from nation-states like China and Russia to criminal networks and lone wolves—stands on the brink, eager to exploit these vulnerabilities for disruption and gain.

 

✓  In conclusion, we're excited to observe a pivotal change: approximately 50% of our new clients are now actively and preemptively crafting their internet security ecosystems. This represents a notable shift from previous trends, where most reached out for our help only after experiencing cyber incidents. To us, this reflects a growing awareness and concern regarding cyber risks. Furthermore, it signifies a rising aspiration among individuals and organizations to harness the wonders of digital technology and the internet securely and with confidence, just as it ought to be.

Thanks for reading,

Brad Sig blue Brad

Brad Deflin

 

Click for browser view

Post Script:

"Is our technology greater than our humanity?"

Senator Kennedy, R-LA questioning Big Tech social media titans, including Mark Zuckerberg, at a Senate hearing on January 31st.

"The Nexus of Disruption: In an era where rapid technological advancements intersect with geopolitical complexities, understanding the intricacies of emerging threats is paramount."

Kris Coleman, on the "Nexus of Disruption." Kris is the founder and CEO of our strategic partner, Red5.  The firm's latest white paper: "2024 Global Security Outlook: A Nexus of Disruption" is a worthy read for those interested in the security-related insights. Red5 has as much experience in the field as anyone and the white paper brings their insights to bear for understanding emerging threats and the fast-evolving face of risk.

"We expect a twister of disinformation that with AI will make discerning fact from fiction increasingly difficult without the right tools and individual critical thinking skills."

Yours truly, on a webinar with a multi-family office group of executives and family members in January, 2024. In the face of AI and its reach on daily life, discerning fact from fiction is a life-skill for survival and success today.

Computer Coaching and Tutoring

 

Our approach is about learning new life skills for increased satisfaction, privacy, and security with personal technology.

  • Clean and optimize your computer or set up a new one.
  • Learn to use a password manager and backup files.
  • Set up your browsers for convenience and privacy.
  • Learn to use AI via ChatGPT and incorporate it as a "knowledge companion" for every day, personally and professionally. 
  • And much more.

Contact us for more.

For previous CyberAdvisor Letters:

light blue newsletter button

To view Blog posts:

light blue Blog button

Total Digital Security, 7777 Glades Rd, Suite 100, Boca Raton, Florida 33434, United States, 877-643-6391

Unsubscribe Manage preferences