Security is not about technology. It's about people.

Security professionals will tell you there are three parts to security: people, processes, and technology. But people are the ones who write and employ processes. People are the ones who create and use technology. It shouldn’t be surprising to learn, then, that people are the cause of nearly 95 percent of all cybersecurity incidents.
Well Aware:
Master the Nine Cybersecurity Habits to Protect Your Future

Key Strategies to safeguard
your future.

Cybersecurity isn’t just one thing – there are nine separate habits that govern how you interact with others through technology. To improve our cybersecurity outcomes, we need to master the nine cybersecurity habits to protect our future.
Cybersecurity relies on a coordinated effort across all teams – but especially HR and IT.

Who Is Responsible For Cybersecurity?

0 %

The threat of cybercrime and the need for increased security is only occasionally discussed at board level in 54% of businesses.

0 %

65% of businesses say cybersecurity needs to be discussed more at senior management level.

0 %

31% of employees receive cyber training and education on an annual basis.

0 %

31% say the responsibility ultimately sits with the CEO

SOURCE: RSM GLOBAL KEY FINDINGS, 2019 CHUBB CYBER RISJ SURVEY

Security is about people, not technology

The Nine Cybersecurity Habits To Protect Your Future.

Security isn’t a skill or something that you’re born with. Security is a behavior, and there are nine different habits that work together to help protect you when using technology.

1. LITERACY

There is an element of security that involves understanding your environment. This involves continuous learning.

2. SKEPTICISM

Being a skeptic means not trusting something until you've established its credibility.

3. VIGILANCE

This is the state of mind for keeping watch so that when you see something, you can be ready to recognize and act.

4. SECRECY

To protect your digital assets, you need to know what they are and you need to understand why you're protecting them.

5. CULTURE

Security doesn't happen in a vacuum, it requires everyone to participate in the form of practices, routines, and traditions.

6. DILIGENCE

After you experience an incident, you need to have plans and protocols for handing how you prepare and respond.

7. COMMUNITY

You need help to be secure. We work together to solve problems.

8. MIRRORING

You want to be able to see your digital self and what you look like from someone else's perspective.

9. DECEPTION

Deception can be both a preventative control as well as a detective one.

Read More About These
Nine Cybersecurity Habits.

This book by George Finney offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. By implementing these habits and changing our behaviors, we can combat most security problems.

There Is A Way To Improve Human Security.

It Starts With Changing One Habit At A Time.

When we train people to be secure, we show them how to set up a pin on their mobile phone or how not to click on links in email. But when a new technology comes out, they need to come back to us for more training because they were given a fish, not taught how to fish.
As humans, we have the unique ability to understand how our own minds work, and then we can change our own minds from the outside in. We must understand not just the technical aspects of security but also the psychology and neuroscience behind it. Security is not a competency; it is a behavior. Behaviors can’t be changed overnight, but they can be changed.

Security Is In Your DNA.

As a social animal, we came together as a species for mutual protection, and we’ve evolved to have a natural desire to want to play a role in security. And whether we come together in our families, communities, or organizations, we need security in order to perform at our highest and reach our full potential as individuals.​

As humans, we have the unique ability to understand how our own minds work, and then we can change our own minds from the outside in. We must understand not just the technical aspects of security but also the psychology and neuroscience behind it. Security is not a competency; it is a behavior. Behaviors can’t be changed overnight, but they can be changed.​

Order yours today &
IMPLEMENT ZERO TRUST tomorrow
Implement Zero Trust initiatives efficiently and effectively.
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist University and our founder, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT Security Director.
Readers will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
Project Zero Trust is an ideal resource for aspiring technology professionals, as well as experienced IT leaders, network engineers, system admins, and project managers who are interested in or expected to implement zero trust initiatives.

DOWNLOAD THE AUDIO COMPANION GUIDE ABSOLUTELY FREE

TRY OUT CHAPTER one TOTALLY FREE

BOOK REVIEWS

"Well Aware shows you don’t need a degree in computer science to safeguard your community. George Finney’s nine cybersecurity habits make protecting yourself online approachable for anyone.”

“George Finney has written a must-read primer for anyone who wants to protect themselves online . . . particularly for leaders who need to protect their organizations. With this book, you can learn from one of the best.”

“George has documented an incredibly practical and holistic overview of the foundational elements of cybersecurity practice and business in general. Definitely worth the read.”

FREE DOWNLOAD.

Well Aware

Companion Guide: Roadmap To Success

Take a closer look at the nine habits found in the Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future book by downloading the Companion Guide: Roadmap To Success at no cost to you!
The Companion Guide: Roadmap To Success goes into greater detail on each of the nine habits in the book and helps to hit them from another angle. Plus, each habit has an illustration and inspirational quote to bring these habits into focus.
BLOG PUBLICATIONS

Recent Articles.

The Origami Man

The following is an excerpt from George Finney’s No More Magic Wands: Transformative Change for Everyone. The book follows the story of Harmony Evergreen, the

Read More »

Mister Groundhog

The following is an excerpt from George Finney’s No More Magic Wands: Transformative Change for Everyone. The book follows the story of Harmony Evergreen, the

Read More »
Click to access the login or register cheese