10 November 2024 – Jonathan F. M. Reyes
When it comes to cyber policy and infrastructure, it should be transparent to users what is known and what is speculative. Privacy, for example, should be defined immediately by cyber-based entities claiming to protect it, and we, as users, should be made aware of the rights we currently have or are being promised when using those entities’ products or services. We are not 100% sure what will happen in the future, including what will happen to our cyber data and related privacy, so we should state possible changes that could happen to our privacy and how that privacy can be taken away. Make the difference clear between what is in effect and what is possible.
Learn from past mistakes and patch bugs or security risks at a minimum to prevent past incidents. Study the effects of those incidents to find correlations between cyber-attacks and incidents and identify if it is human patterns and errors or a hardware vulnerability.
As humans who use cyber technology, we need to be aware of our power over instant information. We don’t know what the long-term effects of having so much information at once will be. Still, the best we can do is control the policies and privacies of how we currently use them but not become too reliant or trusting that the policies will always stay the same. As time changes, we must be able to look at our current cyber policies and infrastructure periodically to adapt them to the changes in time. That being said, we should be cautious about what we do with cyber technologies and how we use them because even though we may be able to adapt, it is natural for the world to change around us. The world will not adapt to us.