Do Not Share Too Much on Social Media

Do Not Share Too Much on Social Media   If you want to keep your privacy on social media, share as little information as possible. You should not share information like your birth date, email address, or your phone number on your profile. The people who need to know your personal information probably already know..
Read More..

 

Protecting the Organization

Protecting the Organization This chapter covers some of the technology and processes used by cybersecurity professionals when protecting an organization’s network, equipment and data. First, it briefly covers the many types of firewalls, security appliances, and software that are currently used, including best practices. Next, this chapter explains botnets, the kill chain, behavior-based security, and..
Read More..

 

Email and Web Browser Privacy

Email and Web Browser Privacy Every day, millions of email messages are used to communicate with friends and conduct business. Email is a convenient way to communicate with each other quickly. When you send an email, it is similar to sending a message using a postcard. The postcard message is transmitted in plain sight of..
Read More..

 

OAuth 2.0

OAuth 2.0 Open Authorization (OAuth) is an open standard protocol that allows an end user’s credentials to access third party applications without exposing the user’s password. OAuth acts as the middle man to decide whether to allow end users access to third party applications. For example, say you want to access web application XYZ, and..
Read More..

 

Two Factor Authentication

Two Factor Authentication Popular online services, such as Google, Facebook, Twitter, LinkedIn, Apple and Microsoft, use two factor authentication to add an extra layer of security for account logins. Besides the username and password, or personal identification number (PIN) or pattern, two factor authentication requires a second token, such as a: Physical object – credit..
Read More..

 

Deleting Your Data Permanently

Deleting Your Data Permanently When you move a file to the recycle bin or trash and delete it permanently, the file is only inaccessible from the operating system. Anyone with the right forensic tools can still recover the file due to a magnetic trace left on the hard drive. In order to erase data so..
Read More..

 

Back up Your Data

Back up Your Data Your hard drive may fail. Your laptop could be lost. Your smart phone stolen. Maybe you erased the original version of an important document. Having a backup may prevent the loss of irreplaceable data, such as family photos. To back up data properly, you will need an additional storage location for..
Read More..

 

Encrypt Your Data

Encrypt Your Data Your data should always be encrypted. You may think you have no secrets and nothing to hide so why use encryption? Maybe you think that nobody wants your data. Most likely, this is probably not true. Are you ready to show all of your photos and documents to strangers? Are you ready..
Read More..

 

Use Passphrase Rather Than a Password

Use Passphrase Rather Than a Password To prevent unauthorized physical access to your computing devices, use passphrases, rather than passwords. It is easier to create a long passphrase than a password because it is generally in the form of a sentence rather than a word. The longer length makes passphrases less vulnerable to dictionary or..
Read More..

 

Use Unique Passwords for Each Online Account

Use Unique Passwords for Each Online Account You probably have more than one online account, and each account should have a unique password. That is a lot of passwords to remember. However, the consequence of not using strong and unique passwords leaves you and your data vulnerable to criminals. Using the same password for all..
Read More..