Connections: Secure Your Network
- Tymeka Y. Whiteside, MA, BCC
- Jul 2, 2021
- 2 min read
The technology capabilities that are available these days have essentially moved the entire world into an environment where being connected is one of the most important functions for success. Many of us rely heavily upon our cellphones, laptops and a plethora of mobile devices. All of these innovative tools tend to make our lives and day-to-day duties a lot more productive simply by the capabilities. We have become so reliant upon technology that we seemingly become paralyzed and lost as if we did not function well prior to "being connected".
The losses of connectivity puts society into a place of frustration stress and sometimes panic. Pause for a moment and think: why is this loss of connectivity putting me into this state of mind? If truth and honesty were to exude from our minds we would answer that question with a few simple thoughts: "I am just used to being able to get what I need when I am connected", "Connections makes things so much easier for me" and "I just rely so much on it". What have we come to with our reliance upon connectivity?
Connectivity is a great option when we have the proper credentials to access the connection source. There seems to be a missing link when we cannot connect. So many times we become discombobulated over the disconnections that occur. The disconnections in life are disproportionately overwhelming because at some point it becomes necessary to password protect our connection sources or we lose access to the portal that we are use to. Open networks are unsecured and increases vulnerability to security breaches by hackers. It is well known that hackers only want to connect in order for them to gain access to information that they are not privy to so that they can misuse the information. Once again take a step back and recognize the hackers and viruses that have been trying to access your network (your heart, your mind, your emotions, your peace, etc.).
Allowing access should only be granted to those that are trusted. Trusted means to have the ability to obtain the proper clearances to gain full access. There is also a level of limited access but that comes with limited capabilities. We have spent too much time allowing others to have free range to roam and to observe everything about us without having to be granted a pass-code. Lock down the connectivity access to protect the "classified" data that is not yet available for general population consumption. Evaluate the individual roles that people play in an effort to determine if full access is necessary. On the flip side, we sometimes are denied access by others and we become frustrated because we are clueless as to why we lost our access. Don't dwell on it but maybe you have a virus that is rendering a poor connection. After all of the self-scans and no virus is found move forward. As we pause for a moment to determine what to do next we then remember that there are OTHER NETWORKS AVAILABLE. Never allow the "viruses" of your network to take you offline, simply install an antivirus and password protect your confidential items. Convenience may not always be an options but security is mandatory.
THE QUESTION: Who do you still allow to connect with full access?
Comments