
Sign up to save your podcasts
Or


Welcome to another edition of Just Unsecure series on information and cyber security matters as it relates to Africa. In this series we will talk about User friendly Security
We look at the current Security Myth
If the interface is easy to use, it’s less secure.
If it’s secure, it’s more difficult to use.
and some steps to take in ensuring user friendly security
1. Involve a UX designer
2. Get Stakeholders Involved in UX Security Early
3. Design Methods for Security Solutions
4. Build for Trust: End to End Encryption
5. Authentication
6. Enhance User Privacy and Data Privacy
7. Remove Unnecessary Security Obstacles
8. Secure Against Social Engineering
.
In Conclusion,
Consider and respect users when designing, implementing and operating any security solution or programs. Remember the WEAKEST LINK!
#UXSecurity #enterprise security #phising #cybersecurity, #cloudsecurity, ,#informationsecurity, #cybersecurity, #infosec,
#InformationSecurity, #CISO
By Babz & OOWelcome to another edition of Just Unsecure series on information and cyber security matters as it relates to Africa. In this series we will talk about User friendly Security
We look at the current Security Myth
If the interface is easy to use, it’s less secure.
If it’s secure, it’s more difficult to use.
and some steps to take in ensuring user friendly security
1. Involve a UX designer
2. Get Stakeholders Involved in UX Security Early
3. Design Methods for Security Solutions
4. Build for Trust: End to End Encryption
5. Authentication
6. Enhance User Privacy and Data Privacy
7. Remove Unnecessary Security Obstacles
8. Secure Against Social Engineering
.
In Conclusion,
Consider and respect users when designing, implementing and operating any security solution or programs. Remember the WEAKEST LINK!
#UXSecurity #enterprise security #phising #cybersecurity, #cloudsecurity, ,#informationsecurity, #cybersecurity, #infosec,
#InformationSecurity, #CISO