#TeamRhino #SaveTheRhino #SaveFive

Raising Awareness to protect our #WildLife, Please take the pledge: I would like to join #TeamRhinodotorg in the fight against rhino poaching to ensure a future for people and vulnerable wildlife on our planet: I will never buy or promote any products made of rhino horn, as I know that demand drives poaching. I will be a committed advocate to support rangers and others on the frontlines of rhino conservation. I will share my passion about rhino conservation and recruit my friends and family to become involved. I will urge my government to continue championing efforts to stop rhino poaching at home and abroad. I will stand with IRF to help save rhinos from extinction. teamrhino.org

Tuesday, January 9, 2024

Proofing Ourselves from Cyber Attacks Using Grow with Google Cybersecurity


 I've started my journey in cybersecurity with the Grow with Google certification program. I really like the work at your own pace platform because i don't feel rushed to learn the subjects. I also like that the videos are translated so that i can take notes.Cybersecurity is important for us all to understand and incorporate in our daily online practices. The Grow with Google platform has so many resources for us to connect to and enhance our understanding of cybersecurity for personal and career growth. 

Cybersecurity aka security is working to ensure confidentialy and integrity by keeping people and  businesses, information and devices protected from unauthorized access. As a cybersecurity analyst i would help protect from risk and outside threats. This work is interesting and helps make a difference in the digital age that we are living in. Best part is Google is doing a great job with the search engine to combat cyber attacks. 


Im not sure what my role will be, but i like keeping us safe and look to host cybersecurity workshops in our communities to help more of us be safe when on our personal devices. This MLK day of service i've partnered with someCommunity partners and STEM professionals to host a family digital literacy workshop introducing our families to computer repair and maintence, cybersecurity and video game development to help bridge the digital divide and promote the lifestyle that people want to live. Entry level is $100,000 in cybersecurity and that beats minimum wage and $15/hr. In 6 months at 7 hours a week we can change our lives and make a difference supporting safe online use. 



Learning the history of how cybersecurity was created helps us to understand how often Threat Actors are looking to hack our systems. Threat Actors are any person or group of person looking to cause cyber harm to our devices, and data. You are instrumental in stopping threat actors from causing harm to your data and devices. Please take 20 minutes to go through the cybersecurity check list and put cybersecurity into practice. Be very careful when opening emails, Phisihing is one of the threat actors favorite ways of stealing information and damaging devices. Be cautious with emails that you don't recognize,  don't click on any links. Instead mark them as phisihing to stop them from coming into your inbox. A perfect example of phisihing is the I Love You virus.   Someone in the office had received an email with the subject “ILOVEYOU” and the message, “kindly check the attached LOVELETTER coming from me.” When they opened what appeared to be a text file — actually an executable program masquerading as one — the virus quickly took control, sending copies of itself to everyone in their email address book. Those recipients, thinking the email was either some weird joke or a serious declaration of love, opened the attachment in turn, spreading it even further. 




Installing security on your devices will also help stop unauthorized access to data. Norton has different packages at a great price, we can afford to be safe online by visiting Best Buy and purchasing Norton 360 Deluxe at $19.99/per year for 3 devices. They also have some packages that come with lifelock to give added protection for a low cost. 






No comments:

Post a Comment