Why Shouldn’t I ‘cc’ People?

Every copy you make of information is a copy someone else can steal, and every person you send information to is another person who can lose that information. Not every information security weakness is technological. Sometimes the little things we do can have tremendous effects on information security. An important example of this is email […]

Why Should I Care, I Don‘t Have Anything to Hide?

The information you are protecting may not be your own.

If there is a common conception about information security in the modern world, it is the conceit that information is primarily about personal privacy. Information security professionals will provide examples of personal data leaks that could be embarassing, harmful or costly, but—as with so many things—the individual risks from bad information security is disproportionate to the aggregate risks. For most people in most situations, poor information security’s threat is not to them personally, but from aggregation, as a threat vector, and through weakened “herd immunity.”