Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Marcena Davis

Forum Replies Created

Viewing 15 posts - 16 through 30 (of 73 total)
  • Author
    Posts
  • in reply to: OCU C)SP A Week 02 Devotion #88779
    Marcena Davis
    Participant

    Growing up, my grandmother used to tell stories, including ones about predictions. I’d always wonder: Can someone really foresee the future?
    Reading about Jesus’s prophesied birth reminded me of these tales. The Bible speaks of his birth in a specific village out of the entire vast world. It’s like pinpointing one shining grain on a huge beach.
    Many scriptures have predictions, but the details about Jesus’s life, told way before his arrival, feels unique.
    My grandmother once said, “Belief is sometimes about feeling, not just seeing.” The prophecies about Jesus feel this way to me – deep and resonating.
    While not everyone might believe in such predictions, they push us to listen closely and let our hearts decide what feels true.

    in reply to: OCU C)SP A Week 01 Devotion #88752
    Marcena Davis
    Participant

    I recall, as a child, trying to assemble a challenging jigsaw puzzle. After hours of searching, there was one piece I couldn’t find. Just as I was about to give up, mother pointed out that the piece was right under my nose. But it looked different from how I’d imagined. This experience taught me that sometimes the answers or clarity we’re searching for might be right in front of us. It often requires a fresh perspective or a helpful nudge to recognize it. Just as that puzzle piece was crucial to completing the picture, understanding Jesus’s divine nature is central to grasping the Christian faith.

    in reply to: OCU C)SP A Week 01 Lesson 03 Discussion #88681
    Marcena Davis
    Participant

    I totally get your concerns about mobile device security in 2022. It’s alarming how malicious apps can sneak into our daily lives, and the concerns around Tic Toc are a prime example. It’s unsettling to think that personal data might end up in the wrong hands and even be sold. And don’t get me started on phishing attacks! Those sneaky emails can easily catch anyone off-guard. We all need to stay extra vigilant to keep our info and gadgets safe. Thanks for shedding light on this.

    in reply to: OCU C)SP A Week 01 Lesson 02 Discussion #88680
    Marcena Davis
    Participant

    I completely agree with your points. The concept of separations of duties reminds me of teamwork in policing, where distributing roles ensures efficiency and thoroughness. The principle of least privilege is vital to keep sensitive tasks limited to those specifically trained. And yes, ongoing security is the foundation—it’s always better to be proactive. Your breakdown is spot-on for any organization aiming to enhance their security. Great points!

    in reply to: OCU C)SP A Week 01 Lesson 02 Discussion #88679
    Marcena Davis
    Participant

    I fully agree with the importance of SOPs. Just like in my police work, clear procedures help ensure swift and effective responses. Continuous training is essential to keep everyone prepared, and I appreciate your emphasis on it. The mention of target goals and backup strategies is crucial for timely recovery and maintaining operations.

    in reply to: OCU C)SP A Week 01 Lesson 02 Discussion #88678
    Marcena Davis
    Participant

    Thank you for your insightful feedback. I’m glad you found the “Analysis After the Fact” point significant. Drawing from my experience as a police officer, I can attest to the importance of post-incident analysis. In the police department, competent incident responses are paramount. After every significant event, we typically conduct debriefings to analyze what transpired, what could have been done differently, and what we can learn for future situations. It’s this rigorous commitment to continuous learning and refining our methods that helps us serve our community effectively. Just as in business, understanding and learning from past incidents in law enforcement ensures we are better prepared for the future. Thanks again for your thoughts.

    in reply to: OCU C)SP A Week 01 Lesson 01 Discussion #88677
    Marcena Davis
    Participant

    Very true! Aligning IT with business needs and goals is crucial. Just as we ask someone to review our papers to ensure quality, businesses benefit from third-party audits. This external perspective ensures they’re compliant with laws and safeguarded against potential threats, helping them present their best selves.

    in reply to: OCU C)SP A Week 01 Lesson 01 Discussion #88676
    Marcena Davis
    Participant

    Thank you for your feedback! You’ve highlighted a crucial point about third-party audits ensuring legal compliance. It’s true, an external perspective helps catch overlooked details, emphasizing the importance of audits for both best practices and risk management. Appreciate your insights and kind words on my post!

    in reply to: OCU C)SP A Week 01 Lesson 01 Discussion #88675
    Marcena Davis
    Participant

    I agree that auditors bring valuable experience from seeing various businesses. Their insights can help identify and fix vulnerabilities early on. Such audits not only boost security but also encourage a culture of ongoing improvement. It’s always better to be proactive.

    in reply to: OCU C)SP A Week 01 Lesson 03 Discussion #88114
    Marcena Davis
    Participant

    Mobile devices have become deeply integrated into our daily lives, but with their increasing capabilities and familiarity come a host of potential risks. Some of the potential risks associated with mobile devices in 2022 and their impact on users are:

    1. Data Breaches and Privacy Concerns:

    Risk: Mobile apps often request permissions to access various features of a device, such as contacts, photos, or location. Some apps can misuse these permissions or become targets for hackers.
    Impact: Personal and sensitive information can be stolen and misused, leading to privacy violations and potential financial loss.

    2. Malware and Phishing Attacks:

    Risk: Mobile malware has become sophisticated, and phishing attacks tailored for mobile users, often through messaging apps or SMS, have become prevalent.
    Impact: Users can unintentionally install malicious software that can steal data, spy on them, or render their devices unusable.

    3. Insecure Wi-Fi and Network Threats:

    Risk: Connecting to open or insecure Wi-Fi networks exposes mobile devices to potential eavesdropping or “Man-in-the-Middle” attacks.
    Impact: Sensitive information like login credentials, personal messages, or financial data can be intercepted.

    4. Physical Theft or Loss:

    Risk: The portability of mobile devices makes them susceptible to being lost or stolen.
    Impact: Beyond the loss of the device itself, there’s a risk of unauthorized access to the personal and professional data stored on it.

    5. Outdated Software:

    Risk: Not all devices receive timely software updates, leaving them vulnerable to known exploits.
    Impact: Hackers can take advantage of these vulnerabilities to gain unauthorized access or control of the device.

    6. Over-reliance on Biometrics:

    Risk: While biometric features like facial recognition and fingerprints offer convenience, they’re not infallible.
    Impact: If compromised, unlike passwords, biometric data can’t be changed, making it a lasting security concern.

    7. App Store Threats:

    Risk: Not all apps on official app stores are vetted adequately, and third-party app stores might harbor malicious applications.
    Impact: Downloading and installing malicious apps can lead to data breaches, loss of money, or device compromise.

    8. IoT Vulnerabilities:

    Risk: As mobile devices increasingly interface with other connected devices, they’re exposed to the vulnerabilities of the broader Internet of Things (IoT) ecosystem.
    Impact: A breach in one connected device can potentially expose all devices on the same network.

    To combat these risks, users in 2022 and beyond should be educated about the potential dangers and best practices, such as regularly updating software, scrutinizing app permissions, avoiding suspicious downloads, and using secure networks. By understanding these challenges and taking preventive measures, mobile device users can better secure themselves in an interconnected digital world.

    Reference:
    Osborne, Charlie. “Here Are the Top Phone Security Threats in 2022 and How to Avoid Them.” ZDNET, 23 July 2022, http://www.zdnet.com/article/here-are-the-top-phone-security-threats-in-2022-and-how-to-avoid-them/.

    in reply to: OCU C)SP A Week 01 Lesson 02 Discussion #88113
    Marcena Davis
    Participant

    Companies need to be ready for unexpected issues, especially in today’s digital age, where cyber threats are a real concern. It’s all about preparing for the “what ifs” and having a plan in place.

    1. Clear Communication: In any situation, especially crises, communication is essential. Companies should have clear channels of communication so that when something goes wrong, the right departments are notified immediately. Being on the same page can make a world of difference.

    2. Defined Roles: Every individual in the incident response team should know their specific responsibilities. Clarity ensures swift action without overlapping efforts or missed steps.

    3. Regular Training: Having a plan is one thing, but practicing it regularly ensures that the team is always ready. Drills should simulate real-life scenarios to make sure everyone knows their roles by heart.

    4. Documentation: Detailed records are vital. Each incident should be meticulously documented, helping to determine the root cause and ensure that such mishaps can be avoided in the future.

    5. Analysis After the Fact: Once things are under control, it’s essential to sit down and evaluate the incident. Analyzing what happened, its implications, and how it was handled can provide insights for future preparedness.

    6. Stay Updated: The world of cybersecurity and risks is ever-evolving. To ensure optimal preparedness, companies should keep abreast of the latest threats and update their protocols accordingly.

    7. External Support: Sometimes, an outside perspective can provide valuable insights. Expert consultants or third-party firms specializing in incident responses can offer guidance and highlight areas for improvement.

    In essence, incident response is about foresight, preparation, and continuous improvement. With the right policies in place, companies can navigate challenges efficiently and bolster their resilience against future threats.

    Reference:
    https://mile2.com/m2-courses/csp/version-00/ebooks/index.html#p=3

    in reply to: OCU C)SP A Week 01 Lesson 01 Discussion #88112
    Marcena Davis
    Participant

    As I was getting to know more about businesses, I learned about third-party audits. It’s like when someone from outside checks if everything’s going right in a company, especially if they’re following rules and standards.

    When a company does this, people tend to trust them more because it’s like a friend telling you the truth rather than you bragging about yourself. It’s like when my husband and I tell each other truths to help each other grow; that outsider perspective can make a world of difference. Plus, when companies get this kind of check-up, they often find ways to do things better. Sometimes, the advice these auditors give can point out things you might not see yourself.

    I’ve heard people say that if you have a third-party audit, you stand out among other businesses. It’s like having an extra badge of honor. Companies that go through these audits often find new doors opened for them. It’s like a safety net. If there ever was a problem, having that third-party check can be like having a backup, showing that you did your best and had someone else check your work too.

    So, in the grand scheme of things, third-party audits can guide businesses to be better and more trusted. Sometimes, the outsider’s perspective makes all the difference.

    in reply to: OCU C)ISSO D Discussion Lesson 16 #85920
    Marcena Davis
    Participant

    Your insights really hit home, Kelly. It’s evident that comprehensive preparation and training are essential for organizations to effectively handle any kind of disaster. By following these steps, companies can protect their employees, minimize damage, and restore operations efficiently.

    in reply to: OCU C)ISSO D Discussion Lesson 18 #85919
    Marcena Davis
    Participant

    Hey Kelly,

    Great post, as it reminded me of the diverse responsibilities a security officer holds. It’s not just about protecting data and preventing cyber-attacks; ensuring fire and safety policies and procedures are in place is equally important.

    I couldn’t agree more with the need to educate and familiarize every person in the organization with the fire plan and procedure. Clear and well-marked evacuation routes are crucial to ensuring everyone’s safety. By making sure everyone knows what to do in case of a fire, you’re taking proactive steps to prevent injuries or even fatalities.

    in reply to: OCU C)ISSO D Discussion Lesson 18 #85918
    Marcena Davis
    Participant

    Hey Kevin,

    I was really interested to read about your experience setting up NSOS (new locations/collision centers) for an EV company. It must be quite a challenge dealing with different fire marshals and inspectors in every city, town, county, and state. But your dedication to securing the buildings and ensuring the safety of your teammates is truly commendable.
    It’s enlightening to hear about the importance of being prepared and vigilant in handling potentially dangerous situations.
    Keep up the fantastic work, Kevin!

Viewing 15 posts - 16 through 30 (of 73 total)

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .