• Home
  • About
    • Official Bio
    • Podcast
    • Resources
    • Community
  • CONSULTING
  • COACHING
  • Speaking Calendar
  • Blog
    • Empowerment
    • Cyber Privacy & Security Awareness
    • Entrepreneurship
      • Digital Strategy
      • Personal Branding
      • Social Media
    • Devotionals
    • Data Privacy & Protection
  • Contact
    • Weekly Newsletter

Cyber Privacy, Security and Risk Mitigation Strategy

January 3, 2017 Belinda Enoma Leave a Comment


*Recently updated to address risk mitigation strategies and raise privacy and security awareness.


Cyber attacks aren’t new. We hear about forces using technology to penetrate systems for manipulative purposes.

I cannot help but ponder about what the average person can do to protect personal data and prevent an enemy intrusion. In this post, I compare cyber warfare with spiritual warfare to think outside the norm and raise privacy and security awareness.

Cyber warfare is a virtual manipulative process used by the enemy to intrude [interrupt, encroach, interfere].

Cyber war is real because without adequate protection, systems can be brought down that affect every area of our lives. A virtual enemy intrusion or threat of intrusion should not be handled with complacency because the consequences can be very costly to the human race, economically and emotionally.

A comparison of cyber warfare and spiritual warfare

Please note that this is not a replacement for data security, privacy and protection strategies that must be applied by institutions. It is a different insight to encourage constant alertness and raise awareness at all levels.

Cyber warfare is similar to spiritual warfare. That is, if you give the enemy an inch, he will definitely take more than a mile and may just set up camp in your bedroom! We cannot be complacent in these times.

  1. The enemy is known yet unknown.
  2. There is always a threat.
  3. It is easier to carry out the attack with an inside job.
  4. You must be ready in and out of season.
  5. It can happen anytime and most likely when you least expect it.

What’s the solution and risk mitigation strategy?

1. Attack is the best form of defense.

That’s what they do in football [well, I mean soccer]. You do not wait for the opponent to attack you. It is not uncanny for forces behind hacks to carry out a preemptive strike. This infers superiority with a forewarning to others.

Then, what should one do?

  • Prepare yourself for the possibility of an attack.
  • Set your defenders in assigned places and on high alert.
  • Take necessary steps to ensure that your defenders are rock solid and trustworthy.

2. Operate with the mentality that there is always a threat.
In spiritual warfare, believers operate with the belief that there is always a threat from the enemy, the adversary of our souls. He is always roaming around like a roaring lion looking for whom to devour. This is why we must be prepared at all times.

3. Know your inside sources. 
Who is in your household and trading secret codes? In Christianity, believers are taught about household wickedness. That is, “a member of your household is your enemy. Does that mean that everyone should walk around suspicious of people? No. It means, spiritually, you cannot trust everybody because even the one in your house can plan to destroy you.

Therefore, just as believers are ready to engage in spiritual warfare and operate with the mentality that we are at war everyday, institutions should arise and operate with the mentality that cyber attacks are increasing daily and there is no room for complacency.


Image credit: Pixabay

Liked this article? Read some more:

How Many Words Do I Need to Write a Book?
Be Clear About Your Offer, Get Paid and Increase Profits
Strategy: How to Find Your Target Market
The Human Aspect of Cybersecurity (and Importance of a Holistic Approach)
Belinda Enoma
Belinda Enoma

Belinda is a Global Privacy and Cybersecurity Consultant, Corporate Trainer, Writer, and International Speaker with a unique blend of law and technology expertise. In addition, she is a digital entrepreneur, ordained pastor, mentor to women ready to impact their generation. She is the host of Destiny Chats podcast and lives in New York with her family. For consultation , click here 

Digital Strategy cyber risk mitigation strategy



Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

GET THE NEWSLETTER

LATEST PODCAST EPISODE

Some Posts You Missed..

  • Multipotentiality: Should You Choose or Pursue Diverse Interests?
  • Value Your Brilliance – Masterclass for Women Ready to Turn Pain to Gain
  • No More Excuses This Year!
  • I Have Hosted Several Conferences and I Share 5 Things Every Speaker Should Know
  • 8 Affirmations to Help You Navigate Life
  • Belinda Enoma is Miss Hall’s School 2022 Commencement Speaker
  • 7 Reasons for Lack of Progress (And What You Should Do)
  • Belinda Enoma Joins ISACA Conference North America 2022 as SheLeadsTech Keynote
  • Why You Should Negotiate for Your Peace of Mind
  • 5 Tips to Help You Value and Monetize Your Brilliance
  • Belinda Enoma Joins SecureWorld New York Conference as Speaker

© 2023 · Belinda Enoma · Privacy

This website uses cookies to give you the best experience. You can find out more here

Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.