Be Curious about Security

Tags: cybersecurity

Hyperconnectivity #

I have an unflattering confession to make – I spend approximately 2 hours everyday of the week, on my mobile device, outside of the already 8 hours of time that I spend on my work computer on weekdays. And this is actually after making a conscious effort to reduce the amount I spend on my phone. To back it up with numbers, here is a snapshot of my daily usage over the past week.

Image

About 50% of the “Information & Reading” is just me doom-scrolling on Reddit, getting unnecessarily engrossed in the latest internet stories (and memes) of the day. What about you? Have you checked your device usage recently? I invite you to pause for a minute and go check your own device usage and report back to yourself after a week. If these analytics aren’t been turned on already, here’s how you do it on Apple or Android phones:

iOS
Android

See anything interesting in what you see? Did you find anything surprising about your own usage over this past week? Do let me know in the comments! For me, I was surprised by the fact that I picked up my phone on an average 73 times per day, with close to 100 pickups on a single day.

Image

This is a very simple exercise to make you aware of the amount of time we spend on average on our devices. It also gives you a nice breakdown of how that time was spent. And one thing we all realise is, no matter who we are, we are spending more and more time on our devices than we used to in the past. This is simply the product of the dopamine era we live in (a whole another topic we can get into at a later stage). Not only that, certain en masse adaptations in lifestyle changes after seismic events like pandemic lockdowns, for example cashless payments, online shopping, etc. have been forced on to us in this day and age.

A Larger Surface Area #

With increased usage, however, we create a much bigger surface area of our lives on the online world. A broader digital footprint increases the number of ways our personal information can be accessed or exploited. Every action we take on the internet, like browsing a site, using WhatsApp, browsing Social Networks, online shopping, or even mundane things like accepting a privacy policy on a website, serves as an entry point. These entry points are potential for marketers, advertisers, cybercriminals to track and exploit. As our use of online and digital services expand and become an extension of our real world, so does the challenge of managing and securing who has access to what we see and do on the internet. And the problem becomes exponential when you also consider device usage of minors under your care.

An interesting side note from the exercise we did earlier – have you realised how easily we came to this stage? How seamless and natural it feels to use our devices for so long in a day? Ease of use and convenience are the hallmarks of all modern online apps and services. But these are the two single-most important reasons for leading us to let our guards down when it comes to online security. When it is so easy to use a service, or an app – privacy and security become the least of our concerns.

Take QR codes, for example. These are the small black squares with distinct reference markers on a white background that your phone, computer, or wearable device can easily read. Once scanned, they quickly redirect you to an app, website, or service. Although QR codes have been around for a couple of decades now, their popularity surged during the COVID-19 pandemic. Suddenly, you could scan a restaurant menu, order food right at your table, or pay for parking without touching potentially contaminated surfaces. Their incredible ease of use, low cost, and seamless integration into daily life turned them into a technological marvel embraced by both businesses and consumers.

Sneak Attack #

However, when a technology becomes a routine part of our lives and almost second nature to us, it’s easy to let our guard down. In the UK, for instance, hundreds of drivers have fallen victim to scams that exploit this very tendency. Scammers overlay a fake QR code atop the genuine one on parking meters, tricking hurried users into scanning the fraudulent code. This simple switch redirects them to a bogus payment site where unsuspecting customers end up handing over their money. And this is only the beginning—more sophisticated QR code threats are emerging, reminding us that even our most trusted conveniences require vigilance.

We hear countless stories of online scams almost every day, and the more we hear, the more desensitized we become. It’s easy to convince ourselves that we’re somehow immune to breaches in our online security. Yet scams like “Digital Arrest” in India prove otherwise. This scam operates with clinical precision, preying on people’s fears and insecurities—especially those of senior citizens. While it might seem like a purely social scam, its success relies on highly targeted information. Criminals obtain this data by accessing victims’ social profiles or, in some cases, even illegally acquired datasets.

Relying on scare tactics though, isn’t the answer when it comes to everyday security. It is important that we protect ourselves and loved ones online. There are so many solutions and services out there that promise to enhance your security and protect you from one threat or the other. But when fear drives our decisions, we risk making irrational choices that might not serve us well in the long run. We should think about online security like how we protect our physical spaces: every time we leave the house or head to bed, we lock our doors, activate security cameras, or set off an alarm system. On vacation, we store our valuables securely yet keep travel documents handy, and we always have emergency contacts ready on speed dial. We follow these simple measures and add on to it other layers of protection as we deem fit and these provide us with a sense of safety and confidence.

Be Curious. Be Secure. #

Digital security should follow a similar philosophy. We don’t need to overcomplicate things—instead, we can adopt simple, effective strategies that give us robust protection for our online lives without breaking the bank. Drawing from my experience as a cybersecurity professional, I’ve seen firsthand how fundamental security concepts can safeguard businesses. These same principles can be easily adapted to protect our personal information.

I think one of the most important and beneficial strategies that we implement in our real world is social connections. Our friends, families, neighbours all provide a very effective support mechanism in keeping each other safe and secure. Safety in numbers, as they say. Although this approach might not directly shield us from online threats, building communities around digital security can be just as effective. By sharing knowledge and engaging in conversations about cyber safety, we can collectively foster an environment where everyone feels more secure.

Being connected to the internet has completely transformed our lives. We are ever curious, ever excited to explore new avenues to keep us productive, entertained, and connected with family, friends and businesses. On the same journey, we have to also explore and learn about ways to secure ourselves in the digital world. By being curious, by asking questions, engaging with like-minded communities, we can keep up with the practices and concepts in cybersecurity that will help us keep safe. If you are new to this journey, I encourage you to start small – question your habits, review what services you use, how do you protect them today. I want to help make cybersecurity simple and approachable, so you don’t have to feel overwhelmed by technical jargon or complex advice. With the upcoming articles on this blog I would be sharing information, concepts, strategies, practices, tips and tricks that are easy to understand and implement on your personal cybersecurity journey.

Subscribe to this newsletter to receive all my posts straight to your inbox. I’d love to hear your thoughts and suggestions on cybersecurity

Webmentions

Loading mentions...

Comments

Loading comments from Mastodon...

Reply or view original thread on Mastodon