Be Your Own Security Expert: Difference between revisions
Line 19: | Line 19: | ||
| '''Install software updates''' | | '''Install software updates''' | ||
: ''Malware generally gets its foothold through unpatched vulnerabilities. People sometimes worry that updates might break something. You might want to wait a few days to give the vendor time to pull a bad patch but no more. Proactive defence by installing updates is much better than reactive defence using antivirus.'' | : ''Malware generally gets its foothold through unpatched vulnerabilities. People sometimes worry that updates might break something. You might want to wait a few days to give the vendor time to pull a bad patch but no more. Proactive defence by installing updates is much better than reactive defence using antivirus.'' | ||
|- style="vertical-align: top; | |- style="vertical-align: top;" | ||
| scope="row" | '''2''' | | scope="row" | '''2''' | ||
| '''Use strong passwords''' | | '''Use strong passwords''' | ||
Line 25: | Line 25: | ||
| '''Use unique passwords''' | | '''Use unique passwords''' | ||
: ''If one site leaks your password the bad guys will try it on many other sites to see what else they can compromise.'' | : ''If one site leaks your password the bad guys will try it on many other sites to see what else they can compromise.'' | ||
|- style="vertical-align: top; | |- style="vertical-align: top;" | ||
| scope="row" | '''3''' | | scope="row" | '''3''' | ||
| '''Change passwords often''' | | '''Change passwords often''' | ||
Line 31: | Line 31: | ||
| '''Use 2-factor authentication''' | | '''Use 2-factor authentication''' | ||
: ''A password is "something you know" - a secret that can easily escape. Requiring you to prove your ownership of "something you have" (such as a token or a mobile phone) or "something you are" (such as a fingerprint or iris scan) raises the bar very considerably.'' | : ''A password is "something you know" - a secret that can easily escape. Requiring you to prove your ownership of "something you have" (such as a token or a mobile phone) or "something you are" (such as a fingerprint or iris scan) raises the bar very considerably.'' | ||
|- style="vertical-align: top; | |- style="vertical-align: top;" | ||
| scope="row" | '''4''' | | scope="row" | '''4''' | ||
| '''Only visit websites you know''' | | '''Only visit websites you know''' | ||
Line 37: | Line 37: | ||
| '''Use strong passwords''' | | '''Use strong passwords''' | ||
: ''Yes of course use strong passwords, and strong means long. Making your password just a few characters longer strengthens your password more than using upper and lower case, numbers and symbols.'' | : ''Yes of course use strong passwords, and strong means long. Making your password just a few characters longer strengthens your password more than using upper and lower case, numbers and symbols.'' | ||
|- style="vertical-align: top; | |- style="vertical-align: top;" | ||
| scope="row" | '''5''' | | scope="row" | '''5''' | ||
| '''Don't share personal information''' | | '''Don't share personal information''' |
Revision as of 21:29, 5 September 2015
Security tips we should all be following. (This page is work in progress.)
Summary
Modern computers and mobile devices store vast amounts of information, some of it sensitive, and yet more of our data is in "the cloud", held by corporations such as Facebook and Google. Just as we've learned that keeping a front door key under the door mat might not be a good idea, there are important and not always obvious lessons we need to learn about keeping our digital lives safe. This page covers the basics.
Security Top Tips
Google carried out research comparing the top security tips given by security experts with the top security measures general users believed were important, and found worrying differences, as shown below.
Non-Security Expert | Security Expert | |
---|---|---|
1 | Use antivirus software
|
Install software updates
|
2 | Use strong passwords
|
Use unique passwords
|
3 | Change passwords often
|
Use 2-factor authentication
|
4 | Only visit websites you know
|
Use strong passwords
|
5 | Don't share personal information
|
Use a password manager
People often worry that to use a password manager is to put all their eggs in one basket. Well, it is, and don't use an obscure one, but with a really good master password the benefit is overwhelming. Never again struggle to remember a website's password or be tempted to choose a weak one or one shared among different sites, and let the password manager choose totally random and completely unguessable passwords for you. |
Additional tips
- Unsolicited attachments/phishing
- Backups - 3 copies, 2 media types, 1 offsite
- Data destruction
- Public networks
External links
- External links (if any) as bullet points.
- If non, delete this section.