Your Security Awareness Iq
Article about security awareness:
Are you aware of the need for security?
Your awareness of the need for security, is the best place to begin a discussion on physical property security.
What is security awareness?
Our definition is multi-faceted, and includes the ability to identify known and unknown threats, being aware of the technologies, products and services that can defuse those threats, knowing how to operate the products and systems you have, and most importantly the awareness that these systems must be used, and must be used all of the time.
This security awareness may be more important to the security of your home and business than any of the security hardware or systems you install.
Why is this?
Any lock or security system, will not do you any good unless, You use it!
An old adage states that "locks only keep honest people honest", and is possibly very true. If the "bad guys" really want to get in, all we can really hope for is to slow them down. If you, with our help, choose and have installed the correct hardware and/or systems, we CAN slow them down - or at least discourage them from threatening your loved ones and your property.
We've all heard the stories, usually from older relatives, about never having to lock our doors or cars, because the town was so safe, and they knew everyone. Well it is sad to say, but those days are gone. When people choose not to secure their property, they are not doing only themselves a disservice, they are also hurting their community. If any one of us makes it easier for the "bad guys" to prosper, they will multiply, our communities become less safe, our property values decline, and our quality of life suffers.
Yes that's right, if a lock is not locked, it's only a decoration. You need to be aware of using your locks every time you leave as the "bad guys" don't advertise what day they are coming!
In medieval times security was easy; the property owner built a castle, dug a moat, and erected a drawbridge. Today these measures are not practical, or even desired. In today's society, if you lived in a castle, and made all of your decisions based on safety and security, you would at the very least be labeled as paranoid. It is important that you balance the level of security you install, and how it operates, with your unique situation. You and any other persons need to fully understand how your systems operate - does it require you to lock it manually or will it fortify your property automatically. If you have too much security, you will not use it; too little security, and it will not do the job.
Back to our medieval castle. The property owner recognizing that he might have to increase the level of security at a moments notice, made provisions to place his archers along the walls. We don't have any archers, but we can be sure that systems and plans are in place. Thus, we can increase the level of security and protection if the threat level increases.
You can combine this security awareness with properly chosen and installed hardware and/or security systems. And with the general security tips provided at this site. Then you can take this information and apply it to your particular situation. With a little initiative and the use of this new security awareness you will be on the way to creating "Peace of Mind" for your family, business and community.
Test your security awareness here: security awareness online test
Article source: InfoSecurityLab
Related Tags: training, security, awareness, information security awareness, infosecuritylab, security awareness, informaton security awareness training
Information security awareness training
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- What Is Spyware?
If you use a computer then there are certain things that you have to be educated about. Spyware is o - There's No Such Thing As The Perfect Password
Even though you can get advice on how to create the perfect password, it's important to realize that - Shopping Online For Contacts: Security And Privacy
The Fairness to Contact Lens Consumer Act, signed into law in 2004, empowered lens wearers with the - Step-by-step Procedure Of Ssl Certificate Installation
SSL certificates are used to transfer the private data entered on the user computer to the website o - Software Protection Versus Code Obfuscation - Stable Software Protection
Security of intellectual property is crucial for every business in today's modern reality. Competiti - Portable Mini Digital Video Recorder
Portable Mini Digital Video Recorder is one of the world's smallest high-resolution mini Digital Vid - Protecting Domain Name From Cyber Squatting And Hijacking
Before I go into details about protecting domain name you should first know that there is no busines - Finding Email Senders Using Reverse Email Lookup
Most of our email inboxes are flooded with so many solicited and unsolicited messages that it's ofte - Confidentiality With Secure Email
Confidentiality, in any business, is among the most significant key in order to keep a client. There - Covering Your Computer's Footprints
When you delete a file, email, or piece of internet history on your computer, where do you think it
Most viewed articles in this category:
- How Does Ssl Fit Into the Over Scheme of Internet Security?
Internet has become an integral part of our life. Most of us prefer to do maximum amount of transact - Tips of Security
Protecting private information Information is the lifeblood of most, if not all, modern organis - Internet Attack Methods
The U.S. Government's National Information Assurance Glossary defines Information Security as: Prote - Information Security Endangered
Sour time is coming. Spy programs are stealing information more easily. The reason is weak algorithm - Computer Viruses
In information security , computer virus is a manmade program or piece of code that is loaded onto y - In Reality, Spyware is Always a Threat
I received a spam email the other day and the subject said "Tired of reality shows? Make your ow - The Top 7 Threats to your Computer in 2007
Now that the holidays are behind us, the cost-conscious among us will be looking for those "post-hol - Security Using Public Internet Array Access
Internet comes to peoples lives and then suddenly comes truth, that WE CAN'T LIVE WITHOUT INTERNET. - Enslaving the Airwaves: the Repercussions of Insecure Wireless Networks
There is no doubt that wireless technology has evolved the way we communicate. With the popular 2.4 - Anti-virus Software Comparison Test
Virus.gr tested quite a few different software companies to see how they would stack up against each