Monday, December 29, 2014

Five steps to keep you safe: Day one, Mobile Devices

You lock the doors and windows in your home, hit the automatic lock on your car when you get out, and avoid sketchy areas, right? All very simple things we've been taught to do from a young age until it's second nature.

Computers and networks in the home are still relatively new to many people, and many people still think because they aren't a "computer person" that the basics are confusing and too hard to pick up. Fact is, no one expects a car owner to understand the intricacies of the ignition switch, but many people have one and drive daily. You know how to fuel it up, change the radio station and roll down the windows, you should know about the locks as well

1: Lock your mobile device.

Maybe some people think it's too much of a hassle to put a four didget PIN on their smartphone or tablet, but not doing so puts you and your information at risk. Ask yourself: If someone picked up your phone, would they have immediate access to your email, facebook accounts or any other social media? Would you want me to see all your photos or other personal information?

I do my best to tread the line between smart security practices and the downright paranoia that some security experts have. I don't want to tell the average phone user they need to fully encrypt their phones with long, complicated passcodes that are required every time you want to check twitter. At the same time, doing nothing is dangerous and leaves you open for attack.

On your phone, find the application named Settings. Regardless of your preferred phone, the security settings will be nestled somewhere in there, and you can put a simple lock on your phone. Some phones have a pattern you can draw and a few of the latest generation has a fingerprint scanner. Whichever route you want to take, just put some kind of lock on it. Not doing so is basically like leaving your car doors unlocked, except losing information can hurt you for years after.

Wednesday, December 24, 2014

Computer Security: Prologue

I've been doing a lot of thinking about security lately. Even before the recent Sony hacks allegedly perpetrated by Best Korea, security has been at the front of my mind in the last few months.

Recently, I attended a software convention in Orlando where I befriended a security expert. We stayed up one evening until two in the morning discussing network and computer security. He would tell me he was constantly surprised by how little people care about their own security when it's so easy.

But it's not easy. It's easy for him because it's his life and career. It's easy for me because I'm a computer expert. I have a degree in network engineering and I am always reading news articles and blogs on the latest and greatest in computers and networking. What might be surprising to you is that not much changes. Layout and design might switch up, the programs and features update year to year, but the basics are the same.

I can say the same about security. You and your parents don't have to worry about international hackers breaking into your computer to steal James Bond scripts. But you still have valuable information. You have a social security number and credit card numbers that I can either use or sell online. You have tax reports stored on your computer that might be easy to access with a little time and knowledge. You wouldn't believe the things people keep wide open while banging out emails at a Starbucks

There are things you don't think of that are always on my mind, and I want to tell you about them as well. It's my duty as your friend and security expert to give you some basic information that will harden your internet and keep you safe.

Terminology

Do you know the difference between a virus and a trojan? How about a worm? The difference between malware and adware?

Thing is, it doesn't matter. Many security experts love to talk in depth about everything you don't care about. We risk losing our audience in a muck of terminology they don't understand and don't care to know. When the people you are trying to educate have their eyes glaze over as you excitedly tell them about the latest in encryption software, they won't take the time to be safe.

In this series, I will use the word 'virus' and 'malware' as the catch all to mean "Crap you don't want on your computer." Viruses and malware both sit in different categories, but the catch-all terms are enough to get the point across.

I'm not here to make you an expert, I'm here to make you a harder target to crack. The joke of "I don't have to outrun the bear, I just have to outrun you" has perfect use here. You will never be 100% secure, but you can be more secure than the person down the street or the person on the airport wifi. Many times, that's all you need.