Home Cybersecurity Cybersecurity Protects Our Continuously Connected Lives

Cybersecurity Protects Our Continuously Connected Lives

0

By James R. Lint
Faculty Member, School of Business, American Military University
Contributor, In Homeland Security

Week four of National Cyber Security Awareness Month (NCSAM) looks at our continuously connected lives. We have seen the growth of connected technologies in many fields.

Smartphones Create an Easier, Less Time-Consuming Shopping Experience

In the old days, our parents would go shopping at several stores to find the items they wanted. Now, most of us have smartphones for that purpose.  What gives value, also can be an avenue of attack for hackers.  Smartphone make life easier and vector for cyberattack.

We can go online and check out the newest items available. We can also see the inventory at Wal-Mart, Home Depot, Lowes and other retailers to determine where we are most likely to find products before we get to the store.

Smartphone Video Deter Potential Thieves at Home

Video is good to have at home as a theft deterrent. However, video beamed to your smartphone is better.

Video software lets you be away from home, but still answer the door. You use your smartphone to talk though a speaker mounted in the doorbell box. The video camera allows you to see and record your visitor. Your visitor will not be able to tell if you’re at home or in another state.

Connectivity Is a New Healthcare Tool

According to a 2015 Forbes article written by Heather Fraser of IBM, “Cloud computing and application programming interfaces enable dynamic new business models to create organizational flexibility. In the healthcare system, specialized organizations can orchestrate activities to deliver sophisticated and innovative health solutions to benefit patients.”

Connectivity has definitely benefited hospitals. Your doctor receives your digital x-rays, even before you are wheeled back to your hospital room. Hospitals now know the exact location of their patients through RFID bands. Computers now schedule a CAT scan, an MRI or a visit through a specialized service.

In the past, a nurse called each department and talked to a scheduler. The scheduler would call a technician to determine if a particular caregiver was available.

Today, availability and scheduling for patients’ healthcare needs are all located in cloud servers. Nurses focus on nursing rather than scheduling, making healthcare centers more efficient.

Update Your Electronic Products to Protect Your Security

Because we rely so heavily on modern technology, we must be vigilant in protecting it from cyberthreats. During National Cyber Security Awareness Month, remember to update the security on your phones, tablet computers and desktop computers with all available updates and antivirus software.

Stay secure!

About the Author

James R. Lint recently retired as the (GG-15) civilian director for intelligence and security, G2, U.S. Army Communications Electronics Command. He is an adjunct professor at AMU. Additionally, James started the Lint Center for National Security Studies, a nonprofit charity that recently awarded their 43rd scholarship for national security students and professionals. He has 38 years of experience in military intelligence within the U.S. Marine Corps, U.S. Army, contractor and civil service.

James was also elected as the 2015 national vice president for the Military Intelligence Corps Association. In 2016 he was accepted as a member of the Military Writers Guild. He has served in the DHS Office of Intelligence and Analysis and at the Department of Energy’s S&S Security Office. James had an active military career in the Marine Corps for seven years and also served 14 years in the Army. His military assignments include South Korea, Germany and Cuba in addition to numerous CONUS locations. James has authored a book published in 2013, “Leadership and Management Lessons Learned,” and a new book in 2016 “8 Eyes on Korea, A Travel Perspective of Seoul, Korea.”

Comments

comments