The Tarheel Pipeline, Summer 2015 - page 12

Y
ou’re busy. Too busy. Too busy to think about foolishness that could happen –
until it does. Think of the mess if you caught an embezzler in your office – or
if all of your customer info leaked to a bad guy. Your customers would be
yelling all over the internet about it. The press would have a field day. And
you could not get a big enough bottle of aspirin to stop that headache.
Today’s technology is fantastic, until it is used against you. Here’s a simple
guide to keep your office safer, with simple action steps you can use this week
to avoid the Cyber Complacency that your busy days can create.
IS YOUR PET’S NAME YOUR PASSWORD?
I have 100 usernames and passwords to remember, just like you. How do
you keep them straight? You could write them on paper and keep it in your
desk drawer. A non-US hacker can’t get them there, but your embezzling co-
worker might. You could use your pet’s name, Fido, and add 1234 at the end.
The hacker will find Fido’s name on your Facebook page, though, and try
the 1234 thing. You could use a service like lastpass.com to store passwords
for you. Just make sure you trust the vendor. You could store your passwords
on your phone – and take constant care not to leave it somewhere. Do any of
these methods work for you?
THE NEW PASSWORD
Security experts that charge millions will tell you that great security is
more than just a username and password. Ideally, you only get access with
something you know, plus something you have. An example of something
you know is a password. Ideally, you have that memorized. Something you
have is your phone – a phone that can receive a text message with a one-time
use code for this one time you are accessing the system. This method is called
“two-factor authentication.” If you have this option with anything you log into
now, strongly consider activating it today. If a hacker gets your username and
password, they likely won’t have your phone to receive the one-time use code
needed to log into your account. You win. The Hacker loses… well, at least
he moves on to the next guy and steals from him.
LOOSE LIPS SINK SHIPS
I mentioned Facebook. What are you putting online about yourself? Hackers
– and your local enemies – can learn a lot about you from what you post
online. Sure, you have your privacy settings turned on – until a privacy policy
changes one day and you did not get the word. Then the world sees all your
relatives’ names and where they live, your mother’s maiden name and where
she lives, your date of birth, and more. These are all great tools that bad
people can use to steal from you. Is it a good idea to have the answers to all
your security questions all over the internet for everyone to see? Think about
whether your security answers and passwords match anything on your social
media connections. If they do, take ten minutes now to change them
.
PREVENT OFFICE COMPUTER LEAKS
U.S. Law Enforcement often does not have resources to catch small-
scale hackers. You have to protect yourself – and your reputation. What if
everything you typed was being sent – as you typed it – to a hacker overseas?
Did you check your online banking today? The bad guys saw the website
you went to, the username you entered, and your password. Did you key in
an application for new service today? They saw all that, too. I am sure you
scan your computers automatically for viruses, but what about malware, bots,
keystroke loggers, and other bad things that can copy your every word and
send it off to the Land of Hackerville? Pay special attention to every computer
you use to type in credit card or bank account numbers. Your credit card
service provider should provide a scanning tool for this purpose. If not, ask
me about getting a new provider that does.
10
NCRWA.COM |
Summer 2015
feature
– CYBER SECURITY FOR BUSY PEOPLE –
1...,2,3,4,5,6,7,8,9,10,11 13,14,15,16,17,18,19,20,21,22,...40
Powered by FlippingBook