Personal Security and Setting Boundaries

As I study the Security domain for A+ Core 2, I’m realizing how closely it mirrors real life. Security isn’t about shutting people out — it’s about protecting what allows the system to function. Over time, I recognized that too many people in my life had unrestricted access to my time, energy, and emotional bandwidth. There was constant demand with little reciprocity, and the result was predictable: burnout, physical strain, and emotional exhaustion. Any IT professional would recognize that as a compromised system.

So I did what security best practices require. I tightened access controls. I set firm boundaries. I went no contact where necessary — not out of anger, but out of self‑preservation. Moving from Pennsylvania to rural North Carolina was part of that system hardening. Fewer interruptions. Less noise. More clarity. In this quieter environment, I can think, meditate, and finally rest. I can see the stars at night and trace constellations again — a reminder of how much perspective returns when the system is no longer under constant attack.

Security isn’t punishment. It’s maintenance. And sometimes, protecting the system is the most responsible thing you can do.


Security as Self‑Preservation

In Core 2, security isn’t about paranoia — it’s about risk management.

I recognized repeated vulnerabilities:

  • Constant access requests with no authentication

  • One‑way data flow: my energy out, nothing returned

  • Emotional and physical resource depletion

  • No patching, no updates, no recovery time

That’s a compromised system.

So I did what any responsible administrator would do;

Boundaries as Firewalls

Firewalls don’t exist to punish traffic. They exist to filter what’s allowed through.

  • I restricted access to protect system integrity.

  • I closed unnecessary ports — emotional, mental, physical.

  • I stopped allowing unverified users to drain resources.

That’s not selfish. That’s baseline security hygiene.

No Contact as Access Control

Authentication matters.

Not everyone gets admin privileges. Not everyone gets persistent access. Some accounts get disabled permanently.

I didn’t disappear — just changed permissions.


Relocation as System Hardening

Moving from PA to rural NC wasn’t running away. It was changing the environment to reduce attack surface.

  • Less noise

  • Fewer interruptions

  • More clarity

  • Space to process, heal, and think

A quieter system runs better.

And the fact that I can now:

  • Meditate

  • Think clearly

  • See the stars and constellations

  • Feel physically lighter and emotionally restored

That’s proof the security changes worked.

Today's Affirmations:

  • Technology keeps me connected.
  •  I value the way digital tools bridge the gap between my loved ones and me.
  • I am modern and relevant. 
  • By learning new skills, I stay active and engaged in today's ever-changing world.



 








Comments

Popular posts from this blog

My Tech Journey Part 1: Choosing to Begin

Stepping Into Power with NPower.org