© All rights reserved.
Nok Nok Nok Nok
  • Solutions
    • Passwordless Authentication
    • Fraud Detection and Prevention -Testing
    • Passkeys
    • Secure Payments
    • Compliance
    • Professional Services
  • Industries
    • Government
    • E-Commerce
    • Financial Services
    • Mobile Network Operators
  • Products
    • Authentication Cloud
    • S3 Suite
    • Smart Analytics Module
    • Smart Sense Module
    • IoT SDK
  • Resources
    • Demo
    • Demonstration – Testing
    • Videos
    • White Papers
    • Testimonials
  • Company
    • About
    • Team
    • Partners
    • Clients
    • Events
    • News
    • Blog
    • Contact Us
    • Support Services
Free Trial
Sign In
Nok Nok
Home / Cybersecurity / Cybersecurity is a Personal Responsibility

Cybersecurity is a Personal Responsibility

  • Author
    Nok Nok News
  • Published
    8 Oct 2020
  • 0 comments
    Join Conversation
Cybersecurity Industry News

This month is National Cybersecurity Awareness Month. Let me be blunt. If you don’t think you are responsible for cybersecurity – you are wrong.

Think about the footsteps you leave in the digital sand, your digital persona, information that you would consider private, valuable and vital. Now, think about how those bits and bytes of data can be used against you, can be taken from you and put to serve nefarious purposes. This is not a science fiction dystopia – this is our world.

To illustrate, let me paint a picture. You have a doctor’s appointment. You show up to the office and check-in on your smartphone, confirming your identity, the time of the appointment and the ailment for which you are being seen. You sit down and – while waiting – you open up your social media platform of choice to pass the time.

Your social media profile lists your friends, their birthdays, the things you like, your political preferences and on and on and on.

While browsing, an ad is presented for something you’re interested in. This ad was served up based on your interests, browsing history and ads that you have clicked on in the past. As such, you are very interested in what is being offered, but you aren’t sure if you can afford it. So before you buy, you open up your banking application to check your balance.

The banking app shows you your current balance in your checking account, your savings account, how much you owe on your credit cards, a long list of recent transactions, where and for how much they were for. You see you have enough for the purchase, flip back over to the advertisement and buy the product. You get called into the office for the doctor and a few days later, your package arrives at your door.

Simple, right? Amazing. It’s the miracle of the modern age.

Now, imagine going through all of that – but rather than it taking place on the privacy of your own screen, it is over the phone and the phone is on speaker. Your ailment is announced to the waiting room. As are the names of all of your friends and your political preferences. Your interests – both private and public – are announced and the things that you want to buy become public knowledge. Your bank account, recent purchases, credit card number and debt are also provided to anyone within the sound of your voice.

Without encryption, without security, without paying attention to the way in which your data is hoovered up, collected and distributed – any passing person who speaks binary can steal, copy, exploit and change your personal information.

That is why this month is important. Your data is YOUR data. It is vital that you are aware of how to protect it. If you have a device that connects – it needs to be protected and YOU are the one responsible for making sure that happens.

This month we look forward to having unfiltered conversations about cybersecurity. We will post our thoughts on how the pandemic has changed the concept of secure perimeter-based security, how the proliferation of small devices connecting to the greater web – as valuable as they are – has increased the attack vectors that we need to monitor and where we all may be headed in the future.

We invite you to join us in this discussion. But even if you don’t, we compel you to remember: The most important person responsible for your cyber security is you. Take that responsibility seriously.

Nok Nok News

Related Posts

Navigating Cybersecurity in Operational Technology: Insights from the Joint Cyber Defense Collaborative
Cybersecurity S3 Authentication Suite

Navigating Cybersecurity in Operational Technology: Insights from the Joint Cyber Defense Collaborative

2024 Security Industry Predictions: Consolidation, ROI, and the AI Hype Train
Cybersecurity Opinion

2024 Security Industry Predictions: Consolidation, ROI, and the AI Hype Train

Top 6 Considerations to Build vs. Buy FIDO-based Passkeys
Cybersecurity

Top 6 Considerations to Build vs. Buy FIDO-based Passkeys

Fun and Not so Fun Evolution of Authentication: Nok Nok’s Cybersecurity Month Special Series
Cybersecurity

Fun and Not so Fun Evolution of Authentication: Nok Nok’s Cybersecurity Month Special Series

Leave a Reply (Cancel reply)

Your email address will not be published. Required fields are marked *

*
*

Contact Us

Nok Nok, Inc.
2890 Zanker Rd #203
San Jose, CA 95134

(650) 433-1300

[email protected]

Get Google Maps Directions

Contact and Subscribe

* indicates required

Latest Posts

  • Navigating Cybersecurity in Operational Technology: Insights from the Joint Cyber Defense Collaborative
  • Quantum is Knocking!
  • Nok Nok Announces Innovative Solutions that Simplify Deploying and Managing Passkeys
  • Navigating the Path to Passkeys: One Approach Does Not Fit All

Navigation

  • Subscribe
  • Careers
  • Resources
  • Support

Nok Nok Labs, Nok Nok, and NNL are all trademarks of Nok Nok Labs, Inc. © 2025 Nok Nok Labs, Inc.
FIDO is a trademark of the Fast IDentity Online, (FIDO), Alliance. All rights reserved.
Terms Of Use and Privacy Policy

Demo
Free Trial
Videos
Contact Us
Support

Contact Us: (650) 433-1300 • [email protected]

Copy
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Please complete this form to view and download this resource.

Submit to Download Forms

* indicates required
  • 日本語