Using Good Cyber Practices to Frame your Personal Cyber Narrative

Using Good Cyber Practices to Frame your Personal Cyber Narrative
Someone in my Twitter timeline wrote a post that resonated with me. Instead of advocating the idea of our firms mandating what we can and cannot do in our homes as working from home (WFH) standards, she said how gracious it was for us to let the firms into our home environments where we had already made investments in how and where we wanted to work in our personal space.So much of what we do daily in our personal ecosphere requires authentication. The WFH bit is just another component of our personal cyber narrative as to what we consume, participate in and add our contributions towards.We managed our personal data storage, verify both ourselves and others in our ecosystem and give access and control our mobile usage. We already approve or deny information requests in our mailbox, in our apps and in our lives in real time.But many in the remote workforce lack discipline in following best cybersecurity practices in their home environment. This includes enforcing strong passwords, recognizing phishing emails, and not changing their WiFi protocols to WPA.I would like to see firms understand that to be good cyber citizens, we need to accountable and protected users. Hiring someone with that profile aids in enabling a secure corporate environment.Hiring for good cyber practicesSo, how can you show an employer your cyber street smarts as an accountable and protected user? For me, this can be shown three ways:By investing in cybersecurity training and badging yourself accordingly on your credentials. Many folks who are WFH have some time to make personal training investments. And as discussed in this using cyber practices frame personal cyber narrative