via Code Name Insight: Hackers and You
On a large scale, there isn’t much you as an individual can do about hackers and their hacks that generally affect tens of thousands, sometimes hundreds of thousands of people in the US each year. But there are many things you can do to protect yourself as an individual from these hacks of the systems you use everyday…
This is something that is near and dear to my heart, mind and soul. I work in the information security field and reading over a few of the items down this list I started to wonder. How many people out there can do even five of these items. Not because they aren’t intelligent or smart but because they’re just not good with tech.
Well, over the next few days/weeks, etc, I think I’m going to go ahead and supplement my CPE requirements for the CISM (ISACA Certified Information Security Manager) and do a how to on a lot of these items.
ISACA is:
An independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.
A Certified Information Security Manager is:
The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages, designs, and oversees and assesses an enterprise’s information security.
Please head on over to Code Name Insight’s site and check out the full article. Not only this one, but they have a ton of other good stuff to read through and think about. For your convenience, I’ve put the list of items here for you. And keep checking back or subscribe to the site so you’ll know when I post a new topic.
- Keep your cell phone/tablet/computer password protected (and don’t forget to log out of secure things like bank account apps after you use them).
- I’ll show you how you can set passwords, pins on devices and how to change them.
- Use two-factor authentication on all of your online accounts.
- I’ll explain what two-factor authentication is in easy to understand language and how to enable it on a large number of sites.
- Don’t use the same password/pin number for every single account you have.
- I’ll give you ideas and examples on how to remember all your passwords and user names without writing them down or keeping them in a program. Along with giving ideas on what software is out there and where to get it.
This may be followed up with several posts on how to use different software.
- Use encryption if possible with your emails, messaging, and other online communications.
- I’ll explain briefly how encryption works and how to use it with e-mails, etc.
- Use a (highly rated) VPN whenever you use public wifi.
- I’ll explain what a VPN is, how to get it and how to use it.
- Regularly change the password on your home wifi router.
- I’ll walk through several different brands and point to where you can get help for others.
- Don’t download any files you did not request or receive from someone unknown to you.
- I’ll explain why this is very important and how to protect yourself.
- Don’t open scam emails.
- I’ll explain what they are and why along with how to recognize them.
- Keep your software and security programs up to date.
- I’ll go over how to do this and what you should have on your computers.
- When you pass on your old digital devices (cell phones, tablets, computers) get rid of all of your info on these devices. Do a factory reset or wipe the hard drive to ensure your personal info is erased.
- Explaining how to do this and make sure you’re not opening up yourself to data theft.
- Come up with false (but memorable to you) answers to security questions (things like your mother’s maiden name is easy enough for a hacker to find online).
- This is a huge one and easy to change your habits.
- Log into each service separately (instead of using Facebook to log into many of your online services, for example).
- Not sure this needs too much explanation, but may post it with another topic.
- If you have highly secret information, consider using an “air gap” computer.
- I’ll explain how to do this and what an air gap computer is.
- Always keep back-up copies of important digital files, password protected of course.
- This is self explanatory but there are things that need said about it.
- Be sure you do your online shopping through reputable companies (and be sure if you log into one of these sites you have the actual real website address, some scammers will take a popular site and change one letter or the domain suffix to catch the unwary).
- Again, self explanatory but there are things that need said about it.
- Never give your passwords/user names/account numbers/other secure personal information to anyone who calls or emails asking for this information no matter who they say they are.
- This is a HUGE topic. I will be going over this one and giving you tips and tricks to avoid getting scammed.
And if there’s anything else, please let me know and I’ll see what I can put together.
Posted in Blogging, Business, Computing, Geek, Hacking, Internet, Prepping, Security, Technology
Tags: air gap, certified information security manager, CISM, code name insight, cybersecurity, data theft, encryption, hackers, hacking, Information security, information systems audit and control association, ISACA, ISACA CISM, preparedness, prepping, protection, safety, scam emails, security, two factor authentication, vpn, wifi
Guest Comments