A cybersecurity professional turned their experience with their kid's tablet into real-world cybersecurity thinking.
Assessing risks, checking for security patches and updated apps, disabling unnecessary permissions, and reviewing app permissions are all part of securing a device.
Threat modeling and continuously monitoring for anomalies are essential practices for cybersecurity professionals, whether securing personal devices or large enterprise networks.
The author believes that cybersecurity is not just for IT professionals but for everyone, and it can start with securing a kid's tablet.