Monthly Archive October 2018

Why Is Securing Your Computer Against Cyber Criminals So Important?

You Must Be Urgently Aware of Cyber Security.

Our digital processing devices and information are the targets of hackers and cyber criminals. This fact is exceeding important an compromises our national security. Many people, however, are unaware.

The reason is simple: Our critical national infrastructure is interconnected. That means any part of the Internet can be connected to any other component.

What is the Critical National Infrastructure?

The federal government and the Department of Homeland Security has declared that there are 16 sectors of our economy that make up the critical national infrastructure. They are:

1. Commercial
2. Chemical
3. Communications
4. Manufacturing
5. Dams
6. The Defense Industrial Sector
7. Emergency Services
8. Energy
9. Financial
10. Food and Agriculture
11. Government Facilities
12. Public Healthcare
13. Information Technology
14. Nuclear Reactors and Waste
15. Transportation
16. Water and Waste Water

You can learn more about the individual parts of the critical national infrastructure by conducting a search on your browser. You can get a significant amount of information.

Everything is Dependent on You

You must be “urgently aware” of cyber security. Most of us and that includes you routinely operate within at least one or more of the critical infrastructure. Any careless digital practices on your part can contribute to the compromise of entire nation’s security.

Let’s look at one example: Assume for a moment that employees at a sensitive defense industry regularly email a nearby doughnut shop their order for convenience sake. Later they quickly pick-up the order. Think of the damage that could happen if the doughnut shop’s computer has been penetrated. Members from a hostile nation’s foreign intelligence service can seriously compromise the nation’s national security. Yet that scenario is the farthest thing from the pastry shop owner’s mind.

Cyber Security Is Your Responsibility!

You would likely lock your door in the evening before going to bed. You look both ways before crossing the street. People where eye protection before using power equipment and fasten their seat belts before driving. Taking extra care an devoting special attention are a part of life.

We’ve now reached that point in our lives when it comes to all interaction with digital devices (e.g. computers, laptops, smartphones and digital sensors). You just be urgently aware of security best practices and use them as a matter of routine.

Ignoring the best practices associated with digital security is reckless and irresponsible.

Summary

You personally can harm yourself and compromise national security by behaving irresponsibly when using your computer, laptops, tablets and smartphones. I know, it sounds a bit “over the top” but it is a fact.

You know you must be urgently aware of protecting your personal computer and smartphones. Now, you are aware there is another huge reason. That is, keeping the bad guys from using your systems as a “entry point” into the critical national infrastructure.

You can create downstream liability for yourself and negative consequences everyone else.

Security Blog

Our Privacy Policy

Our website address is: http://computersecurityjournal.com.

What personal data we collect and why we collect it

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Contact forms

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you have an account and you log in to this site, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Analytics

Who we share your data with

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service.

Your contact information

Additional information

How we protect your data

What data breach procedures we have in place

What third parties we receive data from

What automated decision making and/or profiling we do with user data

Industry regulatory disclosure requirements

Cyber Crime Stories & Incidents

Why Are Your Password Selections So Important?

Your first line of defense against a malicious hacker is a strong password. Create or build a robust password and you go a long way toward protecting your confidential information.

Strong passwords help to prevent unauthorized users from gaining access to your information resources.

Choose a weak secret word and it can be easily defeated by a hacker.

Fight the Hacker and Cyber Crime Threat

You should know how to create complex passwords. Personal computer users and business persons alike should know how to create a strong secret word or phrase and business owners should even consider establishing a company-wide password policy. Employees and other computer users should follow through upon accepted practices. The alternative is for you to risk the consequences of losing control over your confidential and personal information resources.
Most users have the freedom to select their own password or phrase. But do you and others know how to create and maintain strong and robust passwords? Computer and network security best practices require that everyone knows how to do so.
The vulnerabilities are numerous. People are repeatedly asked for passwords when they power-up their personal computing devices and company workstations. Even Internet websites (e.g. your bank, Amazon, etc.) ask us for our unique identifiable pass code before allowing access to personal on-line accounts. We are presumably providing better security and protection for our confidential information when we are using passwords. However, if the secret word(s) you enter are weak a hacker can crack it.

How to Create and Maintain A Strong Password

• A strong password, generally, should be longer in length (between 8 and 14 characters or more) rather than shorter.
• Your passcode should be both upper and lower case alphabetic letters as well as specialized alphanumeric characters. An example of such a password would be: SaM#XXxx5%.
• A passphrase may also be used and tends to be more complex than a password and usually provides even better security. A passphrase might also be easier to remember. An example of a “passphrase” that can be easily remembered might be one that includes special characters such as: $Lillies^Grow#Tall%intheSummer$.
• Regardless of a password or passphrase’s strength, you should avoid writing it down or sharing it with others.
• Avoid using passwords or passphrases that have their origin in the popular culture.
• You should also avoid including personal information in your password (i.e. your birth date or a pet’s name).
• Passwords or passphrases should be changed frequently to remain viable and be unrelated to any previously used passwords. For example, avoid replacing one password such as “Jim’s$PassPhrase$” with a new password that is similar such as “Jim’s$NewPassPhrase$”.
• Computer users should also avoid using common words such as “vegetables” or “fruit” as passwords. Cyber criminals who are trying to gain access to your information assets can use off-the-shelf programs to conduct what is known as a “dictionary attack”. Modern day computers can literally test every word in the dictionary in an attempt to identify your password.
• Consider checking the strength or robustness of your password.

Summary

The purpose for using strong passwords or passphrases is to help assure the confidentially, integrity and availability of your private information assets. Computer users and prudent business owners and computer should educate themselves and possibly consider using consider using additional techniques to improve user authentication. To behave in any other manner is reckless.

Why Every Hacker Wants You to Believe “It Can’t Happen to You”

Why do so many individual computer users secretly believe that “It [a successful attack by a hacker] can’t happen to me?”

People who pay attention to the news know that the Internet is like the wild, wild West. Hardly a day goes by without hearing about the latest data breach horror story. Then why do many of us knowingly fail to follow security best practices in the face of reality?

Why would so many people fail to take even the most basic steps against cybercrime?

That got me to thinking. What do psycho-therapists and psychologists have to say?

One psychologist, Dr. Michael J. Hurd of Delaware suggest that people are seeking a sense of comfort and want to believe that they live in a world where everything is fine. Apparently, people feel a sense of power, security and control if they believe they aren’t at risk. That belief, apparently creates what to Dr. Hurd describes as a huge gap between an objective reality and the perception that using computers poses a significant risk and requires that you use caution. Dr. Hurd describes it as a defense mechanism.

Makes sense to me – how about you?

Certain behavior (e.g. using weak passwords, clicking on unverified links) simply doesn’t make any sense at all. Why would you want to avoid using strong passwords and periodically changing them to make it more difficult for a cyber criminal to get into your confidential information?

You can strengthen your security and keep your information system from being harmed by taking some basic precautions with your computer, communications and confidential information. Follow the best practices associated with cyber security. You make it easier for the hacker when you don’t.

Watch for our upcoming posts for a series on Computer Security Best Practices.

How to Improve Cyber Security and Reduce Your Eye Strain!

 

Improve Cybersecurity

Maintaining the privacy and confidential nature of your business and personal information is extremely important. You must take steps to block every hacker.

One of the largest threats against private digital data are the insiders. The people who work for you or who have close proximity pose bigger threats than foreign actors and organized crime dealing in malware being delivered over the Internet.

You are taking a tremendous risk unless you take steps against the insider threat. The last thing you want to have happen is for a hacker to gain access to your sensitive computer data.

Walking away from your workstation or computer and leaving important information that can easily read or failing to blanking out your screen and locking your keyboard is a huge vulnerability. So is writing down your password and taping it to the back of your keyboard!

There is the possibility of encountering another additional serious risk. It’s known as “visual hacking.” What is visual hacking? It needs to be explained.

Consider the following question. Have you ever felt like someone was watching you while working on your computer or laptop? Chances are that if you did and you glanced in the direction of the person you suspected you caught them quickly looking away. That’s visual hacking.

What was described in the previous paragraph frequently happens to us all in tight public spaces or even in our office or even at home.

A publication on the web, The Unlockr, reports on the findings of a visual hacking research study. It showed that 91% of the time “hackers” could obtain information simple by looking over users’ shoulders and managed to get an average of 3.9 pieces of sensitive information while only being discovered 32% of the time. That’s shocking.

Shoulder surfing or visual eavesdropping can be significantly limited by purchasing and installing of a privacy screen for your computer display. A screen filter that covers the visual screen actually makes it difficult for anyone to read what is being shown on the display. Only an individual who is sitting directly in front of the computer can actually see what’s on the screen.

Privacy screens are relatively inexpensive and can be purchased for a wide variety of monitors.

Click here Now to Get Your Own.