From tripwire.com
In this final part of the series, I discuss why everyone should consider reviewing their OPSEC (Operations Security), not just those with something to hide.
If you haven’t read the previous articles then please check them out first (Part I & Part II), as they provide key background information about the techniques discussed in this post.
The processes described are designed for both technical and non-technical people, especially those who are concerned about their digital footprint and how it might be abused.
As this is the last article in the series I asked the wider infosec community for their views on OPSEC, and their quotes are highlighted throughout this article.