Information Power and International Security

Total Page:16

File Type:pdf, Size:1020Kb

Information Power and International Security Progress in Informatics, No. 1, pp. 39-46, (2005) 39 Research Paper Information power and international security Masahiro Kohara National Institute of Informatics ABSTRACT “Information power” has grown and will continue to grow, increasingly important as an ele- ment of national power in this age of globalization and the information revolution. This paper aims to describe this increasing role of information power. The information revolution has accelerated the pace of globalization and affects the distribution of power among inter- national actors. Meanwhile, the power of non-state actors has been growing within the inter- national community. This change has had a substantial impact on the power and security of nation-states. In particular, international terrorist groups are posing a serious threat to national security and international peace as the influence of such groups is enhanced by their use of information power. The international community must adopt a new strategy to combat terrorism by promoting international cooperation and its own effective use of infor- mation power. Although so-called “hard power” remains a major determinant in the dynamics of international relations, “soft power” of information in today’s information age is even more influential and effective. Information power is composed of both information technology and information content. The former is essential to increase military and eco- nomic power in the information age. The latter is used to form public opinion and deter- mines public trust, perceived legitimacy, and overall appeal. Every nation must nurture its sources of information power to ensure national security in today’s globalized world. Although an in-depth study is required on the relationship between the targets of informa- tion power (such as the establishment of legitimacy) and the components of it such power (i.e. a dominant culture or value such as democracy), this paper offers an initial analysis of this relationship. KEYWORDS Globalization, information technology, national power, hard power, soft power, information power, international terrorism, national security, democracy, legitimacy 1 The impact of globalization in the information people, and information have markedly increased and age accelerated, driven by liberalization policies and the Globalization is not a unique phenomenon peculiar technological revolution. to the world of today. However, the degree and the Columbus discovered America after two months of speed of global interpenetration are more obvious than sailing. Today, Queen Elizabeth could sail from ever. The worldwide flow of goods, services, money, Europe to America in six days and the (now retired) Concorde could complete the Atlantic flight in three hours and twenty minutes. You are dressed in Ameri- Received November 17, 2004; Revised February 7, 2005; Accepted February 8, 2005. can jeans or French fashion, eat a hamburger or drink Coca-Cola, watch a Hollywood movie or listen to a 小原先生.indd 39 2006/01/17 10:22:34 40 Progress in Informatics, No. 1, pp. 39-46, (2005) Sony Walkman made in China. Money flows much kets but also in expanding opportunity and promoting more rapidly than ever; this is even more true of infor- cooperation.[1] mation. Globalization integrates the countries and peo- Another effect of globalization is the spread of ples of the world through the enormous reduction in goods, money, people, and information throughout the the costs of transportation and communication. world; this can be both beneficial and harmful to We must make note of two of the major effects of global peace and prosperity. The Asian financial crisis globalization. in 1997 and the September 11, 2001, terrorist attacks First, no nation can avoid confronting various global in the U.S. clearly demonstrated the concept of global- issues in thus age of globalization. No closed society ization as a double-edged sword. Such effects could in can prosper in a globalized world. Therefore, more fact work against freedom and efficiency within the and more states have liberalized their economies and information-network society. Citizens are likely to have rendered their regimes more transparent and resign themselves to restrictions on their freedom and accountable. Global economic and social transactions privacy drawbacks in exchange for security. This are increasingly liberalized, rather than being con- means that globalization could drive nation-states to trolled by the respective states. Therefore, globaliza- both toward decentralization and subsequent re-cen- tion has had a direct, cross-border impact on people’s tralization of governance; more specifically, toward daily lives. A state can no longer protect its people by the initial diffusion and ensuing concentration of an artificial wall along its border. national power among private entities, local govern- Furthermore, any state, even the U.S. which is the ments, and international organizations. only superpower, cannot afford to resolve on its own various issues caused by globalization. In terms of 2 Hard power and soft power as national power global issues, international organizations and non-gov- National power can be classified into two types: ernmental organizations can play increasingly active “hard” power and “soft” power. Hard power is the roles. The former type of organization is regarded as ability to make others do what one wants, based on the central to the global governance in terms of a func- asymmetries in the possession of material resources. tional approach. The latter type of organization is Soft power is the ability to persuade others to share expected to reflect the interests of the people more one’s goals and vision, based on the attractiveness and directly. Both types of organizations have been work- success of one’s ideas. ing actively to cooperate in areas such as humanitarian According to Hans Morgenthau, national power is assistance. In particular, international NGOs have been defined by nine elements: geography, natural conducting a number of noteworthy grass-roots cam- resources, industrial capacity, military preparedness, paigns on various issues relating to landmines, trade, population, national character, national morale, quality the environment, and more. On the other hand, these of diplomacy, and quality of government[2]. Most of organizations have become catalysts for anti-global- these items are strongly linked to hard power, while ization protests on the occasion of almost every major only the last four are related to soft power. Other meeting of the International Monetary Fund, the World scholars, referred to “realists”, also present similar Bank, and the World Trade Organization. definitions of national power.[3] Soft power represents Second, globalization has a range of both positive an increasingly significant force; one which and negative effects. One of the negative effects is Morgenthau and his followers were not well aware of seen in a widening of the gap between rich and poor. is soft power. Hard power, such as military and eco- Most people in developing countries still lack access nomic power, has previously been the most important to the world market and the global flow of informa- factor in international politics. GNP, land area, popula- tion. We need to be concerned about these people, citi- tion, energy production, and military expenditures are zens, excluded from the globalized world. Otherwise, measurable and comparable elements of hard power in those who benefit from globalization will face an both actual and potential terms. angry political backlash from those who are marginal- National power is dynamic and relative power. First, ized by the increasing inequality among and within it is changeable over time. A number of statistics, such some countries. One can in fact point to the phenome- as enrollment ratios and adult literacy rates, are impor- non as a root cause of terrorism. We should be more tant to indices of potential power. Second, in the inter- concerned about this type of negative impact of glo- national community, national power is always com- balization. It is right that Kofi Annan, United Nations pared among nations. In any case, the elements of hard Secretary General, has appealed to the international power are no longer the final determinants in the age community to accept the concept of “inclusive global- of globalization and the information revolution. ization,” whose purpose lies not only in opening mar- Soft power can complement hard power. Hard power Information power and international security 41 alone is not sufficient to ensure national security and content. The former enables people to communicate to create sustainable peace throughout the world. Soft with each other and to collect and disseminate infor- power can change antipathy and hatred into favorable mation more widely, rapidly, cheaply, and easily. ICT feelings and sympathy. International order could be has been the driving force of the information revolu- established through the combination of dominant hard tion and has become a determinant enhancing military power and superior soft power. and economic capabilities. Information content, on the Even though it is difficult to measure or assess soft other hand, consists of words and pictures that can be power, unlike hard power, there is a growing percep- disseminated by ICT: elements used to form a public tion that soft power has certain capabilities to influ- image and influence public sentiment, with corre- ence and change others[4]. sponding effects on popular trust, legitimacy, and Individuals and groups wield soft power to influence appeal. Both technology and content are important, others. While power has been controlled by the sover- but growing attention has come to be paid to the latter. eign state since the Westphalia treaty, globalization Image is an important factor for state and non-state and the information revolution are likely to diffuse actors in the information age. For example, the con- national power, potentially leading to a global threat of cept of the “brand” is one of the decisive elements of anarchy. Non-state actors can enhance their abilities to marketing power among private corporations.
Recommended publications
  • BEST PRACTICES in Anti-Terrorism Security for Sporting and Entertainment Venues RESOURCE GUIDE
    Command, Control and Interoperability Center for Advanced Data Analysis A Department of Homeland Security University Center of Excellence BEST PRACTICES in Anti-Terrorism Security for Sporting and Entertainment Venues RESOURCE GUIDE July 2013 Table of Contents Introduction to the Project ............................................................................................................7 Background...................................................................................................................................8 Identifying Best Practices in Anti-Terrorism Security in Sports Venues ......................................8 Identifying the Key Best Practices and Developing Metrics for Each .........................................11 Developing a Best Practices Resource Guide .............................................................................13 Testing the Guid e ........................................................................................................................13 Executive Summary....................................................................................................................13 Chapter 1 – Overview.................................................................................................................15 1.1 Introduction...........................................................................................................................15 1.2 Risk Assessment ...................................................................................................................15
    [Show full text]
  • DDS Security Specification Will Have Limited Interoperability with Implementations That Do Implement the Mechanisms Introduced by This Specification
    An OMG® DDS Security™ Publication DDS Security Version 1.1 OMG Document Number: formal/2018-04-01 Release Date: July 2018 Standard Document URL: https://www.omg.org/spec/DDS-SECURITY/1.1 Machine Consumable Files: Normative: https://www.omg.org/spec/DDS-SECURITY/20170901/dds_security_plugins_spis.idl https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_governance.xsd https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_permissions.xsd https://www.omg.org/spec/DDS-SECURITY/20170901/dds_security_plugins_model.xmi Non-normative: https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_governance_example.xml https://www.omg.org/spec/DDS-SECURITY/20170901/omg_shared_ca_permissions_example.xml Copyright © 2018, Object Management Group, Inc. Copyright © 2014-2017, PrismTech Group Ltd. Copyright © 2014-2017, Real-Time Innovations, Inc. Copyright © 2017, Twin Oaks Computing, Inc. Copyright © 2017, THALES USE OF SPECIFICATION – TERMS, CONDITIONS & NOTICES The material in this document details an Object Management Group specification in accordance with the terms, conditions and notices set forth below. This document does not represent a commitment to implement any portion of this specification in any company's products. The information contained in this document is subject to change without notice. LICENSES The companies listed above have granted to the Object Management Group, Inc. (OMG) a nonexclusive, royalty-free, paid up, worldwide license to copy and distribute this document and to modify this document and distribute copies of the modified version. Each of the copyright holders listed above has agreed that no person shall be deemed to have infringed the copyright in the included material of any such copyright holder by reason of having used the specification set forth herein or having conformed any computer software to the specification.
    [Show full text]
  • Fedramp SECURITY ASSESSMENT FRAMEWORK
    FedRAMP SECURITY ASSESSMENT FRAMEWORK Version 2.4 November 15, 2017 EXECUTIVE SUMMARY This document describes a general Security Assessment Framework (SAF) for the Federal Risk and Authorization Management Program (FedRAMP). FedRAMP is a Government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud-based services. FedRAMP uses a “do once, use many times” framework that intends to save costs, time, and staff required to conduct redundant Agency security assessments and process monitoring reports. FedRAMP was developed in collaboration with the National Institute of Standards and Technology (NIST), the General Services Administration (GSA), the Department of Defense (DOD), and the Department of Homeland Security (DHS). Many other Government Agencies and working groups participated in reviewing and standardizing the controls, policies and procedures. | i DOCUMENT REVISION HISTORY DATE VERSION PAGE(S) DESCRIPTION AUTHOR Major revision for NIST SP 800-53 Revision 4. 06/06/2014 2.0 All FedRAMP PMO Includes new template and formatting changes. Formatting changes throughout. Clarified distinction 12/04/2015 2.1 All between 3PAO and IA. Replaced Figures 2 and 3, and FedRAMP PMO Appendix C Figures with current images. 06/06/2017 2.2 Cover Updated logo FedRAMP PMO Removed references to CSP Supplied Path to 11/06/2017 2.3 All Authorization and the Guide to Understanding FedRAMP PMO FedRAMP as they no longer exist. 11/15/2017 2.4 All Updated to the new template FedRAMP PMO HOW TO CONTACT US Questions about FedRAMP or this document should be directed to [email protected]. For more information about FedRAMP, visit the website at http://www.fedramp.gov.
    [Show full text]
  • Global Terrorism: IPI Blue Paper No. 4
    IPI Blue Papers Global Terrorism Task Forces on Strengthening Multilateral Security Capacity No. 4 2009 INTERNATIONAL PEACE INSTITUTE Global Terrorism Global Terrorism Task Forces on Strengthening Multilateral Security Capacity IPI Blue Paper No. 4 Acknowledgements The International Peace Institute (IPI) owes a great debt of gratitude to its many donors to the program Coping with Crisis, Conflict, and Change. In particular, IPI is grateful to the governments of Belgium, Canada, Denmark, Finland, Greece, Luxembourg, the Netherlands, Norway, Spain, Sweden, Switzerland, and the United Kingdom. The Task Forces would also not have been possible without the leadership and intellectual contribution of their co-chairs, government representatives from Permanent Missions to the United Nations in New York, and expert moderators and contributors. IPI wishes to acknowledge the support of the Greentree Foundation, which generously allowed IPI the use of the Greentree Estate for plenary meetings of the Task Forces during 2008. note Meetings were held under the Chatham House Rule. Participants were invited in their personal capacity. This report is an IPI product. Its content does not necessarily represent the positions or opinions of individual Task Force participants. suggested citation: International Peace Institute, “Global Terrorism,” IPI Blue Paper No. 4, Task Forces on Strengthening Multilateral Security Capacity, New York, 2009. © by International Peace Institute, 2009 All Rights Reserved www.ipinst.org CONTENTS Foreword, Terje Rød-Larsen. vii Acronyms. x Executive Summary. 1 The Challenge for Multilateral Counterterrorism. .6 Ideas for Action. 18 I. strengThen Political SupporT For The un’S role In CounTerIng Terrorism ii. enhanCe straTegic CommunicationS iii. deePen relationShips BeTween un head- quarTerS and national and regIonal parTnerS Iv.
    [Show full text]
  • National Policies and the Role of Communities, Cities and Regions
    CLIMATE CHANGE AND RENEWABLE ENERGY NATIONAL POLICIES AND THE ROLE OF COMMUNITIES, CITIES AND REGIONS A report from the International Renewable Energy Agency (IRENA) to the G20 Climate Sustainability Working Group (CSWG) JUNE 2019 © IRENA 2019 Unless otherwise stated, material in this publication may be freely used, shared, copied, reproduced, printed and/or stored, provided that appropriate acknowledgement is given to IRENA as the source and copyright holder. Material in this publication that is attributed to third parties may be subject to separate terms of use and restrictions, and appropriate permissions from these third parties may need to be secured before any use of such material. ISBN: 978-92-9260-136-2 Citation: IRENA (2019), Climate Change and Renewable Energy: National policies and the role of communities, cities and regions (Report to the G20 Climate Sustainability Working Group (CSWG)), International Renewable Energy Agency, Abu Dhabi. About IRENA The International Renewable Energy Agency (IRENA) is an intergovernmental organisation that supports countries in their transition to a sustainable energy future and serves as the principal platform for international co-operation, a centre of excellence, and a repository of policy, technology, resource and financial knowledge on renewable energy. IRENA promotes the widespread adoption and sustainable use of all forms of renewable energy, including bioenergy, geothermal, hydropower, ocean, solar and wind energy, in the pursuit of sustainable development, energy access, energy security and low-carbon economic growth and prosperity. www.irena.org Acknowledgements G20 Climate Sustainability Working Group members provided valuable comments and suggestions on this study. The report was prepared by Elisa Asmelash and Ricardo Gorini.
    [Show full text]
  • Federal Bureau of Investigation Department of Homeland Security
    Federal Bureau of Investigation Department of Homeland Security Strategic Intelligence Assessment and Data on Domestic Terrorism Submitted to the Permanent Select Committee on Intelligence, the Committee on Homeland Security, and the Committee of the Judiciary of the United States House of Representatives, and the Select Committee on Intelligence, the Committee on Homeland Security and Governmental Affairs, and the Committee of the Judiciary of the United States Senate May 2021 Page 1 of 40 Table of Contents I. Overview of Reporting Requirement ............................................................................................. 2 II. Executive Summary ......................................................................................................................... 2 III. Introduction...................................................................................................................................... 2 IV. Strategic Intelligence Assessment ................................................................................................... 5 V. Discussion and Comparison of Investigative Activities ................................................................ 9 VI. FBI Data on Domestic Terrorism ................................................................................................. 19 VII. Recommendations .......................................................................................................................... 27 Appendix ....................................................................................................................................................
    [Show full text]
  • The Interim National Security Strategic Guidance
    March 29, 2021 The Interim National Security Strategic Guidance On March 3, 2021, the White House released an Interim and what the right emphasis - in terms of budgets, priorities, National Security Strategic Guidance (INSSG). This is the and activities—ought to be between the different kinds of first time an administration has issued interim guidance; security challenges. The 2017 Trump Administration NSS previous administrations refrained from issuing formal framed the key U.S. national security challenge as one of guidance that articulated strategic intent until producing the strategic competition with other great powers, notably congressionally mandated National Security Strategy (NSS) China and Russia. While there were economic dimensions (originating in the Goldwater-Nichols Department of to this strategic competition, the 2017 NSS emphasized Defense Reorganization Act of 1986 P.L. 99-433, §603/50 American military power as a key part of its response to the U.S.C §3043). The full NSS is likely to be released later in challenge. 2021 or early 2022. By contrast, the Biden INSSG appears to invert traditional The INSSG states the Biden Administration’s conceptual national security strategy formulations, focusing on approach to national security matters as well as signaling its perceived shortcomings in domestic social and economic key priorities, particularly as executive branch departments policy rather than external threats as its analytic starting and agencies prepare their Fiscal Year (FY) 2022 budget point. The Biden Administration contends that the lines submissions. With respect to the latter, FY2022 will be the between foreign and domestic policy have been blurred to first budget prepared after the expiration of the budget caps the point of near nonexistence.
    [Show full text]
  • Principles for Software Assurance Assessment a Framework for Examining the Secure Development Processes of Commercial Technology Providers
    Principles for Software Assurance Assessment A Framework for Examining the Secure Development Processes of Commercial Technology Providers PRIMARY AUTHORS: Shaun Gilmore, Senior Security Program Manager, Trustworthy Computing, Microsoft Corporation Reeny Sondhi, Senior Director, Product Security Engineering, EMC Corporation Stacy Simpson, Director, SAFECode © 2015 SAFECode – All Rights Reserved. Principles for Software Assurance Assessment Table of Contents Foreword ��������������������������������������������������������������������������������������������������������������������������������� 3 Methodology �������������������������������������������������������������������������������������������������������������������������� 3 Problem Statement ���������������������������������������������������������������������������������������������������������������� 4 Framework Overview ������������������������������������������������������������������������������������������������������������� 5 Guiding Principles for Software Security Assessment ����������������������������������������������������������������������6 The SAFECode Supplier Software Assurance Assessment Framework ������������������������������ 7 What Are Your Risk Management Requirements? ����������������������������������������������������������������������������7 The Tier Three Assessment �����������������������������������������������������������������������������������������������������������������8 The Tier One and Tier Two Assessments ���������������������������������������������������������������������������������������������8
    [Show full text]
  • Small Business Information Security: the Fundamentals
    NISTIR 7621 Small Business Information Security: The Fundamentals Richard Kissel NISTIR 7621 Small Business Information Security: The Fundamentals Richard Kissel Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 October 2009 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Deputy Director Acknowledgements The author, Richard Kissel, wishes to thank his colleagues and reviewers who contributed greatly to the document’s development. Special thanks goes to Mark Wilson, Shirley Radack, and Carolyn Schmidt for their insightful comments and suggestions. Kudos to Kevin Stine for his awesome Word editing skills. Certain commercial entities, equipment, or materials may be identified in this document in order to describe and experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. i Table of Contents Overview...................................................................................................................................................... 1 1. Introduction.......................................................................................................................................... 1 2. The “absolutely necessary” actions that a small
    [Show full text]
  • An Introduction to Computer Security: the NIST Handbook U.S
    HATl INST. OF STAND & TECH R.I.C. NIST PUBLICATIONS AlllOB SEDS3fl NIST Special Publication 800-12 An Introduction to Computer Security: The NIST Handbook U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards Barbara Guttman and Edward A. Roback and Technology COMPUTER SECURITY Contingency Assurance User 1) Issues Planniii^ I&A Personnel Trairang f Access Risk Audit Planning ) Crypto \ Controls O Managen»nt U ^ J Support/-"^ Program Kiysfcal ~^Tiireats Policy & v_ Management Security Operations i QC 100 Nisr .U57 NO. 800-12 1995 The National Institute of Standards and Technology was established in 1988 by Congress to "assist industry in the development of technology . needed to improve product quality, to modernize manufacturing processes, to ensure product reliability . and to facilitate rapid commercialization ... of products based on new scientific discoveries." NIST, originally founded as the National Bureau of Standards in 1901, works to strengthen U.S. industry's competitiveness; advance science and engineering; and improve public health, safety, and the environment. One of the agency's basic functions is to develop, maintain, and retain custody of the national standards of measurement, and provide the means and methods for comparing standards used in science, engineering, manufacturing, commerce, industry, and education with the standards adopted or recognized by the Federal Government. As an agency of the U.S. Commerce Department's Technology Administration, NIST conducts basic and applied research in the physical sciences and engineering, and develops measurement techniques, test methods, standards, and related services. The Institute does generic and precompetitive work on new and advanced technologies. NIST's research facilities are located at Gaithersburg, MD 20899, and at Boulder, CO 80303.
    [Show full text]
  • Regions and Cities at a Glance 2020
    Regions and Cities at a Glance 2020 provides a comprehensive assessment of how regions and cities across the OECD are progressing in a number of aspects connected to economic development, health, well-being and net zero-carbon transition. In the light of the health crisis caused by the COVID-19 pandemic, the report analyses outcomes and drivers of social, economic and environmental resilience. Consult the full publication here. OECD REGIONS AND CITIES AT A GLANCE - COUNTRY NOTE UNITED STATES A. Resilient regional societies B. Regional economic disparities and trends in productivity C. Well-being in regions D. Industrial transition in regions E. Transitioning to clean energy in regions F. Metropolitan trends in growth and sustainability The data in this note reflect different subnational geographic levels in OECD countries: • Regions are classified on two territorial levels reflecting the administrative organisation of countries: large regions (TL2) and small regions (TL3). Small regions are classified according to their access to metropolitan areas (see https://doi.org/10.1787/b902cc00-en). • Functional urban areas consists of cities – defined as densely populated local units with at least 50 000 inhabitants – and adjacent local units connected to the city (commuting zones) in terms of commuting flows (see https://doi.org/10.1787/d58cb34d-en). Metropolitan areas refer to functional urban areas above 250 000 inhabitants. Disclaimer: https://oecdcode.org/disclaimers/territories.html Regions and Cities at a Glance 2020 Austria country note 2 A. Resilient regional societies The District of Columbia has the highest potential for remote working A1. Share of jobs amenable to remote working, 2018 Large regions (TL2, map) LUX GBR AUS SWE CHE NLD ISL DNK FRA FIN NOR BEL LTU EST IRL GRC DEU AUT LVA SVN OECD30 PRT HRV POL ITA USA CZE HUN CAN ESP ROU SVK BGR TUR COL ​ 0 10 20 30 40 50 % The shares of jobs amenable to remote working vary greatly across the United States, ranging from 47% in District of Columbia to 25% in Mississippi (Figure A1).
    [Show full text]
  • Cybersecurity Basics
    CYBERSECURITY FOR SMALL BUSINESS CYBERSECURITY BASICS Knowing some cybersecurity basics and Cyber criminals target putting them in practice will help you protect your business and reduce the risk companies of all sizes. of a cyber attack. PROTECT YOUR FILES & DEVICES Update your software Secure your files Require passwords This includes your apps, web Back up important files offline, Use passwords for all laptops, browsers, and operating on an external hard drive, or in tablets, and smartphones. systems. Set updates to the cloud. Make sure you store Don’t leave these devices happen automatically. your paper files securely, too. unattended in public places. Encrypt devices Use multi-factor authentication Encrypt devices and other media that Require multi-factor authentication to access areas contain sensitive personal information. of your network with sensitive information. This This includes laptops, tablets, requires additional steps beyond logging in with a smartphones, removable drives, backup password — like a temporary code on a smartphone tapes, and cloud storage solutions. or a key that’s inserted into a computer. LEARN MORE AT: FTC.gov/SmallBusiness CYBERSECURITY FOR SMALL BUSINESS PROTECT YOUR WIRELESS NETWORK Secure your router Change the default name and password, turn off remote management, and log out as the administrator once the router is set up. Use at least WPA2 encryption Make sure your router offers WPA2 or WPA3 encryption, and that it’s turned on. Encryption protects information sent over your network so it can’t be read by outsiders. MAKE SMART SECURITY YOUR BUSINESS AS USUAL Require strong passwords Train all staff Have a plan A strong password is at least Create a culture of security Have a plan for saving data, 12 characters that are a mix of by implementing a regular running the business, and numbers, symbols, and capital schedule of employee training.
    [Show full text]