As Nikola Tesla said: “If you want to find the secrets of the universe, think in terms of energy, frequency and vibration”.
Everything is energy. The universe, nature, us. Our brain is composed by electromagnetic signals and it functions in vibrations. Those vibrations are tuned with frequencies and those frequencies define our lives. So, whether we do it consciously or not we have the role of the energy manager. As you may understand this is an ongoing process. There is no destination. If you stop managing your energy you go bankrupt. As Marie Forleo says #hugthemoment.
You are probably wondering how this is related to security.
Energy fuels everything: our bodies, our cars and various technical appliances that we use on daily basis. When energy gets depleted, we and our machines cannot function at our highest capacity.
The truth is that you will find the best protection in the intangible. Tangible is just an illusion. Tangible is just a vehicle and without the right fuel it cannot take you anywhere.
Tangible is what is easy to understand but at the same time it is what masses use. Intangible is what only selected few know and maintain as a secret. Its power is in the secrecy, the unpredictability.
It takes very deep knowledge about security to get to the level at which you can really understand what security really is about and how you can control your protection levels.
Today I am going to attempt to demonstrate the difference with an example.
The good news is that you are defining your security tank levels. Each of your habits and beliefs results in actions that are serving as the fuel of your security tank. A positive habit adds fuel to your tank and a negative one removes fuel from it. As the manager of your security tank you are responsible to maintain high levels of fuel by continuously employing good habits, beliefs and actions, and by continuously identifying things that are depleting and draining your ability to be protected in order to eliminate them.
Examples of depleting your security tank:
- Believing you are not in danger of a cyber-attack,
- Hiding your head in the ground because you believe this way the attackers will not see you,
- Believing there is no 100% security, thus there is nothing you can do for your protection. I challenge this belief and maintain that you can create full-proof security for you and your business [link],
- Connecting to public WiFi,
- Worrying about cyber-attacks every day, but not doing anything to create protection,
- Reacting to attacks as they come,
- Leaking important data in the cloud,
- Having easy to guess or break passwords,
- Not having current and up to date backup of your data.
Examples of adding fuel to your security tank:
- Understanding cyber-criminals’ motives and behavior,
- Knowing how attacks are triggered,
- Knowing how to avoid cyber-attacks with the right behavior,
- Being aware of trends on attacks,
- Adding unpredictability factor to your security,
- Reading this article 😊
In conclusion, each behavior, habit and action you have has a positive or negative effect on your security tank. Maintaining your protection is all about balancing yourself and maintaining the highest possible level of fuel in your security tank. I hope I have convinced you that keeping high level of fuel in your security tank in the most essential thing you need to have for your security. Additionally, this requires continuous practice as cyber criminals always await their victims. In case you are not aware, a new study shows that 8 out of 10 attacks are triggered by you which means that hackers do not have the power to penetrate your security unless you let them in. Guess how you let them in. With your habits, behavior and actions. That is why if there is one thing you can do for your security is maintaining high levels of fuel in your security tank.
So, what is important to understand is that managing your security tank is a continuous practice and learning to balance out your fuel in this tank takes time and effort, but the key here is awareness. Being always aware and curious about every belief, habit and action you take, and how it affects your security levels is power. Most people have no idea about this concept. Now you know.
In this management system past and future events do not count, whether you got hacked in the past or it never happened to you – does not count at all. Only now matters. What are you doing right now to stay protected?
- If you want to know how to start, make space in your mind first. Examine and evaluate every belief and habit you have about security because they rule your actions.
- Know that what worked in the past might not be valid anymore. Technology is moving really fast and currently, security is technology’s legs.
- Stop trusting systems blindly. All systems are designed with the agencies’ requests for backdoors (backdoors are an alternative way to access a system without needing the owner credentials). Whether this is good or not it’s a completely different story. The issue here is that not only governments have this backdoor access anymore. Cyber-criminals have it as well which raises the point that you need to strategize your security and make it unpredictable.
- Do you manage effectively your security tank?
- Did you discover habits and beliefs that you have, which can damage your protection levels? Please do not tell me which ones for your protection. Just tell me if you discovered any compromising habits and beliefs
- How many habits and beliefs can you employ immediately to improve your security levels?
I cannot wait to hear your comments so leave them below and let’s continue the conversation.
Your Protection spheres Click below if you prefer to listen. Learn how to become unpredictable here... Last night I met with my very good friend and extremely talented worldwide successful composer Marios Joannou Elia. Marios is one of the most...
How to write the best security script to follow - Why your business needs security policies & procedures Click below if you prefer to listen. Free Quick start guide: Master your business Protection An essential part of security is the...
Your assets Island - Your effective protection management team Click below if you prefer to listen. Free guidance checklist - Cover your protection bases In a previous episode called “Your security Tank” I introduced you to the concept of your...