Content added/updated
since 2018-10-12
Support ...
Documents ...
Staff ...
GEikenberryC...
Twitter

Blog

logo
Gary Eikenberry Consulting
22-1010 Polytek Street, Ottawa, ON Canada  K1J 9J1
E-mail: Click to email;  Web: http://www.geconsult.ca
Telephone...

Tips for Safe Computing

Whatever your operating system or computing environment, a few simple habits can help protect you from malware and other threats which can transform your computer into a portal into a nightmare of hijacked email, ransomed data, stolen passwords or even stolen identities and other disasters. Just as Gary tells students in his self-defence and street-proofing classes, our purpose here isn't to make you paranoid, but to arm you with information and techniques to make you safer.

  1. I'm not using Windows so I'm safe: Not exactly. While MS Windows has a reputation of being more vulnerable no operating system is 100% safe. Apple's iOS and OS-X as well as Android and Linux have been getting a lot more attention from the purveyors of malware, spyware and other nasty things that can compromise your computer. Besides having your operating system targeted you should be concerned about security threats that are "operating system agnostic" like the so-called Heartbleed Bug or the "Poodle" vulnerability which exploit weaknesses via a web browser, whatever the operatng system under which it runs.
  2. Updates: Operating system and software security updates and patches are usually issued after a vulnerability has been identified and they certainly aren't unique to the Windows "ecosystem." Once an update or patch is issued anyone looking to exploit vulnerabilities who didn't know about it before becomes aware of it. The longer you delay in installing available updates and patches, the more vulnerable you become.
  3. Passwords: Your password is supposed to protect you and your system. Weak passwords and passwords written on sticky notes stuck to monitors or keyboards are like leaving the front door key in the lock. A strong password contains a mix of upper and lower case letters, numbers and non-alphanumeric characters and is not an easily recognizable word, name or a birthday (especially if that birthday is exposed to social media). Of course there is a bit of a balancing act between choosing a strong password and one you can remember without writing it down and leaving in a plainly visible location. It's also worth noting that using the same password (or PIN for that matter) for multiple accounts means that if it does get cracked or stolen one time everything becomes wide open. And if you have so many passwords that you can't remember them all, consider a "password safe" program or at least an encrypted and password protected document or PDF file rather than a text or document file with a name like passwords.doc.
  4. Protective software: While MS Windows has a reputation of being more vulnerable, and therefore more in need of software that is designed to protect you from the wide range or malware threats, no operating system is 100% safe. Anti-virus software and browser plug-ins, while not infallible, are definitely advisable. And never spend more on protective software than your data or personal identity is worth to you. There are good free and open source options out there, but many of the free versions, especially for Microsoft, Apple or Android systems, have paid versions that are even better.
  5. Don't click "OK": Well, okay, go ahead and click it, but not without first reading the alert or other message. And if you're asked to authorize the installation or execution of something you didn't specifically intend to install or run CANCEL the operation immediately. One of the things that makes most Linux based systems more resistant to vulnerabilities is that,
  6. Email can be like a chain saw: It can be a great tool, but it can also be dangerous. Don't even open messages that come from unknown senders or look suspicious. Remember, even an email that appears to be from a friend or colleague can be dangerous: email addresses can be spoofed or you friend's account or address book could be compromised by their own malware infection. And, whatever you do, treat any unexpected attachment as potentially toxic. Even a benign looking document file can contain hidden script that can unleash the hounds of hell just by opening what purports to be a resume or a joke. The same can be true of video clips.
  7. Hover before you click: Chances are very good that your bank, or eBay or PayPal will never send you an email containing a link to your account and that link that looks like it points to www.paypal.com is really going to a completely different domain with a fake log in page intended to steal your user id and password. When it comes to browsing the same can be true. If you hover your mouse over a link and the URL displayed points to a different domain than the displayed link purports to represent don't click it!
  8. Backup, backup, BACKUP! Anything that's worth saving on your computer is worth backing up. Not convinced? Reformat your hard drive to find out what you could be missing after an infection or a system crash. Well don't really format your hard drive, but think about what you could lose if you did.
  9. Portable devices: Whether it's a laptop, tablet, smartphone or any other connected device, it probably contains data, stored passwords or anyone of a number of other things which could make your life miserable in the wrong hands. Never leave it unattended even for a minute. A client of ours left her laptop long enough to get a refill on her coffee at a coffee shop. It wasn't stolen, but during the time it was out of her sight someone apparently connected a USB key and copied her My Documents folder, which contained, among other things, a document entitled Banking. We'll leave the rest to your imagination. But even if you never leave your device unattended, you can still be vulnerable. We recommend against doing any on-line transaction which might expose sensitive data (including passwords) over unencrypted public Wi-Fi connections. Even if you're working over a secure (https:) browser connection it is possible for someone with (admittedly illicit or at least unethical) software intended for such things to intercept a Wi-Fi data stream, save it to a hard drive and the analyse it at their leisure (again, illicit tools are required) to decrypt and extract passwords, etc.
  10. Be careful of what you store in the cloud: On-line or cloud storage can be great, but you should always remember that whenever you store data there you're trusting someone else to protect it, so we would advise against cloud storage for anything you wouldn't ask a stranger to keep an eye on for you while you go get another cup of coffee.
  11. Privacy and security go hand in hand: Think before you post. It may be obvious that telling Facebook that you're looking forward to 2 weeks in a tropical paradise when your home address is posted somewhere on-line is like advertising on www.TargetsForBreakins.com, but there are lots of other ways in which an ill-considered post or information you divulge in an on-line survey (do you really know who might be one the other end of that clever "tool" to tell you what kind of cat you most resemble?) can compromise not only your privacy, but also your security.

All things considered, the greatest threats to safe computing are complacency, smugness and ignorance, but we've barely scratched the surface here. We haven't even mentioned firewalls and other ways of securing your network or stand-alone computer from incursions from the Internet, spam filters, tracking cookies, lock screens or shoulder surfers. Find out more about safe computing practices by exploring the links at https://duckduckgo.com/?q=safe+computing+guidelines, bearing in mind that this link will send you to the Internet-in-wild and GEConsult can't vouch for the accuracy of any information you might find there.

This document is also available as a downloadable PDF file.

All code and content on this site © 1992 - by Gary Eikenberry Consulting.