Beyond the Noise: Appreciating the Quiet Work of Effective Doers

In many cases, few, if any, are aware of the work that they do and how important it is.
We as an industry are long overdue in appreciating those who talk little but deliver big for us time and time again.
Getting things done requires more than talk - it requires action, discipline, know-how, hard work, consensus building, and a constant focus on the goal.
When working towards a desired end, there isn't a lot of time to shout from the hilltops.
Perhaps that is why the people who spend a lot of time talking about what they are doing aren't the ones we look to when a job needs to get done.
Being On Time: Regarding being on time, one of my friends once shared with me that if you tell someone to be out front in 15 minutes to receive a suitcase with a million dollars, they would be there on time.
In other words, being on time is about prioritizing what is important to us.
If our work meetings, deadlines, and other obligations are important to us, we will be on time.
Of course, there are extenuating circumstances that arise from time to time, but not as often as people claim they do.
Whether it is showing up for a meeting, delivering ahead of a deadline, or anything else, the people we look to get things done on time.
Some people are constantly throwing out new ideas, new directions, and new fads.
More often than not what is thrown out is simply a shiny object that pulls us off track.
As much of a challenge as staying focused is, getting things done requires it.
Underpromise and Overdeliver: I've always been fascinated by people who pontificate their grandiose plans, only to fail to deliver on them again and again.
It is a tragic cycle, and generally, after two or three instances of it, people within the organization get wise to it.
Perhaps it is because the overpromisers aren't aware enough to realize that people have gotten wise to them.
These are the people we look to when we want to make sure something will get done right.
We all know who we can count on, whether in our personal lives or our professional lives.
More often than not, we are grateful for and celebrate the wrong people.
It is incumbent on all of us to take the time to appreciate and acknowledge the doers in our lives.


This Cyber News was published on www.securityweek.com. Publication date: Thu, 14 Dec 2023 12:43:04 +0000


Cyber News related to Beyond the Noise: Appreciating the Quiet Work of Effective Doers

Beyond the Noise: Appreciating the Quiet Work of Effective Doers - In many cases, few, if any, are aware of the work that they do and how important it is. We as an industry are long overdue in appreciating those who talk little but deliver big for us time and time again. Getting things done requires more than talk - ...
6 months ago Securityweek.com
CVE-2024-26626 - In the Linux kernel, the following vulnerability has been resolved: ...
3 months ago
Cybersecurity in the Age of Remote Work - The shift towards remote work has brought numerous benefits, but it has also exposed organizations to new cybersecurity risks. We will uncover key insights and best practices to ensure the safety of operations in the age of remote work. In ...
4 months ago Securityzap.com
Securing Remote Work: A Guide for Businesses - This article aims to provide businesses with a comprehensive guide to securing remote work, covering the essential components of remote work security policies and exploring best practices for ensuring secure communication. By implementing these ...
5 months ago Securityzap.com
Cybersecurity for Remote Work: Securing Virtual Environments and Endpoints - Remote work surged in popularity out of necessity during the COVID-19 pandemic but seems to be here to stay, thanks to its unique advantages. With the rise in remote work also comes an increase in cybersecurity challenges spurned by the circumstances ...
6 months ago Cybersecurity-insiders.com
What is Security Service Edge? - The contemporary work landscape is swiftly transitioning into a hybrid model, encompassing remote and office-based work for employees. This transformation introduces novel challenges in ensuring security across many work locations with diverse ...
6 months ago Cybersecuritynews.com
Do AirPods Work With Android? - AirPods work well with Android, but the experience may be less satisfying or convenient compared to Apple's ecosystem. Certain features are unavailable such as customizing double-tap functionality and access to Siri voice assistant. One of the best ...
6 months ago Hackercombat.com
How to turn shadow IT into a culture of grassroots innovation - Total, centralized IT control is no longer practical now that hybrid work and BYOD are here to stay. When users look for new ways to get work done, the solutions they find can be the seeds of innovation and the key to unleashing productivity and ...
6 months ago Helpnetsecurity.com
One Day in the Life of EFF's Activism Team - EFF's activism team includes experienced issue experts, master communicators, and grassroots organizers who help to coordinate and orchestrate EFF's activist campaigns that include but go well beyond litigation, technical analyses and solutions, and ...
1 month ago Eff.org
IT and security professionals demand more workplace flexibility - The concept of Everywhere Work is now much broader, encompassing where, when, and how professionals get their work done - and flexibility has become a key workplace priority, according to Ivanti. Ivanti surveyed over 7,700 executive leaders, IT and ...
2 months ago Helpnetsecurity.com
Cyber scam call center slavery expands beyond southeast Asia The Register - Human trafficking for the purposes of populating cyber scam call centers is expanding beyond southeast Asia, where the crime was previously isolated. Interpol revealed this week that an ongoing investigation has discovered evidence of abuse emanating ...
6 months ago Go.theregister.com
5 common data security pitfalls - Many organizations are caught in the crosshairs of cybersecurity challenges, often due to common oversights and misconceptions about data security. From the pitfalls of decentralized data security strategies to the challenges of neglecting known ...
6 months ago Securityintelligence.com
CVE-2023-46217 - Multiple vulnerabilities exist in Ivanti Avalanche v6.4.1 WLAvalancheService.exe.CVE-2023-41727 - MuProperty type 100 stack-based buffer overflow (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)A message sent to WLAvalancheService.exe on TCP port 1777 ...
6 months ago Tenable.com
CVE-2023-46216 - Multiple vulnerabilities exist in Ivanti Avalanche v6.4.1 WLAvalancheService.exe.CVE-2023-41727 - MuProperty type 100 stack-based buffer overflow (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)A message sent to WLAvalancheService.exe on TCP port 1777 ...
6 months ago Tenable.com
CVE-2023-41727 - Multiple vulnerabilities exist in Ivanti Avalanche v6.4.1 WLAvalancheService.exe.CVE-2023-41727 - MuProperty type 100 stack-based buffer overflow (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)A message sent to WLAvalancheService.exe on TCP port 1777 ...
6 months ago Tenable.com
CVE-2024-35852 - In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work The rehash delayed work is rescheduled with a delay if the number of credits at end of the work is not negative ...
1 month ago Tenable.com
The Role of the CISO in Digital Transformation - Modern-day demands require organizations to be flexible and digitally savvy, getting work done remotely and in the public cloud as often as in a centralized physical location, if not more so. As companies continue to modernize their workflows and ...
7 months ago Darkreading.com
CVE-2022-24759 - `@chainsafe/libp2p-noise` contains TypeScript implementation of noise protocol, an encryption protocol used in libp2p. `@chainsafe/libp2p-noise` before 4.1.2 and 5.0.3 does not correctly validate signatures during the handshake process. This may ...
2 years ago
VoltSchemer attacks use wireless chargers to inject voice commands, fry phones - A team of academic researchers show that a new set of attacks called 'VoltSchemer' can inject voice commands to manipulate a smartphone's voice assistant through the magnetic field emitted by an off-the-shelf wireless charger. VoltSchemer can also be ...
4 months ago Bleepingcomputer.com
Navigating the Internship Odyssey: Taking a Leap To Love Where I Work - When I started interviewing for Cisco, I was overwhelmed. I didn't believe I was the number one candidate for a project management internship, as I was a telecommunications bachelor graduate and was studying computer science. Well, I have seen ...
3 months ago Feedpress.me
7 Months Inside an Online Scam Labor Camp - He had been kidnapped and forced to work for an abusive online scam operation. A man was abducted by a Chinese gang and forced to work in a scam operation. More than anything else, Neo Lu, a 28-year-old Chinese office worker, believed the gig would ...
6 months ago Nytimes.com
CVE-2023-52587 - In the Linux kernel, the following vulnerability has been resolved: ...
3 months ago
Tracking Everything on the Dark Web Is Mission Critical - COMMENTARYOne of the standard cybersecurity tools today is to relentlessly check the Dark Web - the preferred workplace for bad guys globally - for any hints that your enterprise's secrets and other intellectual property have been exfiltrated. It ...
3 months ago Darkreading.com
Unlocking the Secrets of Data Privacy - Data masking, or obfuscation involves hiding original data with random characters or data. Data masking is commonly used in software development and testing, where developers must work with realistic data sets without accessing sensitive information. ...
5 months ago Feeds.dzone.com
Azure MACC Credits Gathering Dust? Use Them to Get the Best Prevention-First Security - As we enter 2024, your organization may have unused MACC or Azure commit-to-consume credits as your annual renewal date draws near. Whether you have credits that will soon expire or are starting to plan your Azure spend for the next 12 months, Check ...
5 months ago Blog.checkpoint.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)