Do Not Share Too Much on Social Media

Do Not Share Too Much on Social Media   If you want to keep your privacy on social media, share as little information as possible. You should not share information like your birth date, email address, or your phone number on your profile. The people who need to know your personal information probably already know […]
Continue reading…

 

Protecting the Organization

Protecting the Organization This chapter covers some of the technology and processes used by cybersecurity professionals when protecting an organization’s network, equipment and data. First, it briefly covers the many types of firewalls, security appliances, and software that are currently used, including best practices. Next, this chapter explains botnets, the kill chain, behavior-based security, and […]
Continue reading…

 

Email and Web Browser Privacy

Email and Web Browser Privacy Every day, millions of email messages are used to communicate with friends and conduct business. Email is a convenient way to communicate with each other quickly. When you send an email, it is similar to sending a message using a postcard. The postcard message is transmitted in plain sight of […]
Continue reading…

 

OAuth 2.0

OAuth 2.0 Open Authorization (OAuth) is an open standard protocol that allows an end user’s credentials to access third party applications without exposing the user’s password. OAuth acts as the middle man to decide whether to allow end users access to third party applications. For example, say you want to access web application XYZ, and […]
Continue reading…

 

Two Factor Authentication

Two Factor Authentication Popular online services, such as Google, Facebook, Twitter, LinkedIn, Apple and Microsoft, use two factor authentication to add an extra layer of security for account logins. Besides the username and password, or personal identification number (PIN) or pattern, two factor authentication requires a second token, such as a: Physical object – credit […]
Continue reading…

 

Deleting Your Data Permanently

Deleting Your Data Permanently When you move a file to the recycle bin or trash and delete it permanently, the file is only inaccessible from the operating system. Anyone with the right forensic tools can still recover the file due to a magnetic trace left on the hard drive. In order to erase data so […]
Continue reading…

 

Back up Your Data

Back up Your Data Your hard drive may fail. Your laptop could be lost. Your smart phone stolen. Maybe you erased the original version of an important document. Having a backup may prevent the loss of irreplaceable data, such as family photos. To back up data properly, you will need an additional storage location for […]
Continue reading…

 

Encrypt Your Data

Encrypt Your Data Your data should always be encrypted. You may think you have no secrets and nothing to hide so why use encryption? Maybe you think that nobody wants your data. Most likely, this is probably not true. Are you ready to show all of your photos and documents to strangers? Are you ready […]
Continue reading…

 

Use Passphrase Rather Than a Password

Use Passphrase Rather Than a Password To prevent unauthorized physical access to your computing devices, use passphrases, rather than passwords. It is easier to create a long passphrase than a password because it is generally in the form of a sentence rather than a word. The longer length makes passphrases less vulnerable to dictionary or […]
Continue reading…