flight

flight
flight

Tuesday, July 14, 2020

Cyber hygiene

CyberSecurity FAQ - What are the best practices for cyber hygiene?

RECOMMENDED BEST PRACTICES FOR CYBER HYGIENE - TOP 10
The best practices for effective cyber hygiene should include and extend the following:
  1. Protect your computer network with secure routers with robust firewalls. While traveling, use a Virtual Private Network (VPN) and/or software firewall.
    The 1st line of cyber defense in computer network security is to install and maintain a secure Internet Protocol (IP) router and a robust firewall that prevents unauthorized users from accessing data, email, applications, web browsers, etc. If you are a computer system administrator: install and configure a secure commerical IP router, white list all approved users, black list all unknown users, and ensure that the wireless (WiFi) communications use WPA2/WPA3 encryption for wireless comunications. If you are a home computer user, check out the Home Broadband Routers section of the LifeWire What Is a Router for Computer Networks? article. If you are traveling away from your business or home computer network, ensure that you are using a secure Virtual Private Network (VPN) and/or your Operating System (OS) has a secure software firewall turned on.
  2. Install dependable anti-virus (AV) and anti-malware software that continuously scans your computer/mobile phone, and update it frequently
    The 2nd line of cyber defense in computer network security is to install and maintain robust anti-virus (AV) and anti-malware software that scans and terminates computer viruses and other kinds of malicious sofware (malware). If you are a computer system administrator install a robust commericial Intrusion Protection Device/Intrusion Protection Device product; if you are a home computer user ensure that you install either a commercial or FOSS (Free & Open Source Software) AV software product.
  3. Update all OS, Web Browser and Application software with security patches in a timely manner.
    The 3rd line of cyber defense in computer network security is to update all Operating System (OS), web browser, and application software regularly to ensure that security patches are properly installed in a timely manner. These security patches are essential to make sure that all currently-known cybersecurity vulnerabilities have been closed.
  4. Define strong passwords and use Multi-Factor Authentication (MFA) whenever available
    • Define strong passwords that are unique and complex: 12+ characters, combo of lower case letters, upper case letters, numbers, and special chars (e.g., !@#$%^&*).
    • Do not share passwords, change them regularly (say every 3 months), and do not share the same passwords.
    • Use 2-Factor Authentication (2FA) or Multi-Factor Authentication (MFA), which adds an additional layer of security to passwords, whereever practical, especially to financial, health, and other confidential accounts. 2FA and MFA greatly increases security by corroborating your password with additional information such as a unique pin, biometrics (facial or fingerprint recognition), secondary device (e.g., a personal mobile phone can corroborate web browser password login on a desktop computer).
  5. Practice safe web browsing habits
    Since many commercial companies seek to harvest personal data it is essential that you practice safe web browing habits which include, but are not limited to, the following:
    • Configure your web browsers' privacy and security settings to block third party cookies, not save passwords, not autocomplete, and not save search histories. (If there is no configuration to not save search histories, purge these and all other saved information, regularly.
    • Set your default web browser search engine to a choice that does not track your query content and habits, for example, DuckDuckGo.
    • Set your default web browse to a choice that fully complies with current W3C standards and supports security plugins. For example, Free & Open Source Software (FOSS) FireFox fully complies with W3C web standards and supports the following security plugins:
      • HTTPS Everywhere The Electronic Frontier Foundation (EFF) and The Tor Project jointly developed this Firefox, Chrome, and Opera extension to support the secure HTTPS communications protocol vs. the standard HTTP protocol, which is more widely used but less secure. (The ‘S’ in HTTPS stands for ‘secure.’) HTTPS Everywhere encrypts communications with many major websites to help secure your browsing experience.
      • Web of Trust (a.k.a. WOT). This extension for FireFox, Internet Explorer, Chrome, Safari, and Opera helps determine if a website is safe to surf. The extension displays traffic signal icons next to URLs and links. Green means the site is reliable; yellow indicates you should proceed with caution; red translates to “steer clear.” The ratings are crowdsourced from WOT’s global user base and are supported by trusted third-party sources, such as up-to-date directories of malware sites.
    • Check out shortened links from a non-trusted source prior to clicking on them, since they have been known to mask malicious links. Check out via ExpandURL or CheckShort URL online utilities.
    • Only visit web sites with via HTTPS (= HTTP Secure) protocol and ensure that the web site's SSL Certificate is valid. (Typically the web URL will begin with "https://…" and the web browser will show a "padlock" icon if the site's SSL certificate is valid.
    • Beware when installing web browser plugins from unknown/untrusted sources. All plugins should be simple and single-purpose in nature; complex, multi-function plugins that are not properly maintained can increase cyber attack surfaces to exploit. For more detailed information about safe web browsing habits check out the Department of Homeland Security’s (DHS) Securing Your Web Browser guide, which explains web browser features and associated risks (e.g., ActiveX, Java, JavaScript, cookies, certain plug-ins, cookies, etc.).
  6. Practice safe email habits
    Consider that most free commerical email services (GMail, Outlook.com, iCloud Mail, Yahoo Mail, GMX Mail etc.) compromise your privacy to serve targeted ads or otherwise exploit your personal data, it is essential that you practice safe email habits, which include, but are not limited to, the following:
    • Beware of spear fishing emails from unknown/untrusted sources that may link to or contain mailware! Do not click on a link or open an attachment from an unknown/untrusted source. Delete and purge subject email and blacklist the sender.
    • Do not include sensitive or confidential information (e.g., financial, health) in your email subject, content or plaintext (unencrypted text, a.k.a. clear text) attachment. If you need to send sensitive or secure information via email, encrypt it as an attachment, and send the password via an alternative mechanism (e.g., voice communication, SMS/MMS text message, separate unassociated email).
    • Consider a secure email service, with end-to-end encryption to ensure that your email content remains private. Check out: The 5 Best Secure Email Services for 2019: Encrypted email services keep your messages private.
  7. Keep your user data separate from applications, and apply strong encryption to all sensitive and confidential data
    Keep all user data separate from user applications, and keep personal data separate from business data. Apply strong encryption (AES-256 bit or higher) with strong passwords (see #4 above) to all sensive and confidential data including, but not limited to, financial and health data.
  8. Keep your user data separate from applications, and back up data regularly
    Keep all user data separate from user applications (see #6 above) and back up data to another network node (computer or server) frequently (weekly if not daily), and offsite (cloud-based and/or bank deposit box) regularly (monthly if not bi-weekly).
  9. Be wary and selective when buying goods or services online.
    You should be specially wary when buying goods or services online, especially when it is a unknown/untrusted source. In general you should:
    • Check the website is secure. Check that the website URL starts with the letters “HTTPS://” and has an image of a small "padlock", usually in the top left-hand corner (see #5 above)
    • Select your item(s) you wish to purchase, add them to your Shopping Cart temporary storage, and proceed to the Check Out page to pay.
    • Enter your credit card details (name, address, phone number, email, credit card#, CVV#, etc.) as needed.
    • Verify that shipping and billing information are correct.
    • Confirm payment and keep a soft copy of the payment information.
  10. When selling and disposing of computers and storage devices securely erase all persistent storage.
    When selling or disposing of your desktop, laptop, tablet, smartphone or USB drive, it’s critical that you securely wipe (erase) all personal, sensitive and confidential data. Deleting files alone is insufficient, since they frequently can be recovered by hackers and forensic specialists. Conequently, you should securely erase as explained in the following PC World article How to securely erase your hard drive. Check out Scientific American's How to Destroy a Hard Drive—Permanently article.
Keep in mind that, like human hygiene, you need to practice cyber hygiene on a regular, systematic basis for it to be effective. Don't worry above implementing all ten of the best practices listed above immediately; you will be better served by implementing them incrementally and opportunistically as you become more cyber WOK (aware)!
If you have constructive recommendations to correct, clarify or otherwise improve this or any other Cybersecurity FAQ please contact us.

CYBER HYGIENE HANDS-ON TRAINING OPTIONS
If you seek professional cyber hygiene training that demystifies the technobabble of cybersecurity and emphasizes pragmatic best practices for protecting your sensitive "crown jewel" data, check out PivotPoint's Essential Cyber Hygiene Applied hands-on training workshops.

No comments:

Post a Comment

dd

dd
rrr

using a Sim card registered in someone TZ

using a Sim card registered in someone


Artificial Intelligency Brain

Artificial Intelligency Brain
A. I. Mind

BIG BROTHER

BIG  BROTHER
BB WATCHING

Listen

Listen
Hear

SONIC ENERGY

SONIC ENERGY
SOUND

Observe

Observe
Look and Watch

My Visitors

Counter

My Browser is .....

My I.P. Address

ONLINE USERS 112

ONLINE  USERS 112
REAL TIME MAP

TODAY

Search This Blog

TRANSLATE

https://fast.com/#

https://fast.com/#
https://fast.com/#

Cookies Policy

Our website uses cookies to store your settings, recommend content, target ads and gather statistics. This information is shared with 3rd parties. By using our site, you agree to our use of cookies.

https://www.flightradar24.com/

https://www.flightradar24.com/
https://flightradar.live/

browsers

browsers
top five

search

search
engines

INFORMATION & STATISTICS

INFORMATION & STATISTICS

Your browser will also display a padlock icon to let you know a site is secure.
Your account was recently logged into from an unrecognized browser or device. Was this you?
is-your-smart-device-spying-on-you ?
TOP 500 WEBSITES--POPULARITY
ONLINE ACTIVITIES FOR DIFFERENT AGE-GROUPS
WHO IS SPYING ON ME ? FACEBOOK AND GOOGLE ???
do not track
tracking
cookies
carbon foot prints
visitors
where do my visitors come from
spying--PRIVACY IS RIGHT
spy wares
phishing
ad targeting browsing behaviors
browsing behavioral or history
web master
hackers --taking control of your computer

Over 400 Popular Sites Record Every Keystroke, Claims Princeton Study




We noticed a recent login for your account.
If this wasn’t you:
Your account may have been compromised and you should take a few steps to make sure your account is secure. To start, reset your password now.

By continuing to use the website,
you agree to our Use of Cookies.


THE INTERNET HAS TRUST ISSUES !

PRIVACY POLICY

For each visitor to our Web page, our Web server automatically recognizes only the consumer's IP address, but not the e-mail address.

We collect e-mail address of those who purchase from us and from those who opt-in to our e-mail list. The information we collect is used by us to contact consumers for marketing purposes. If you do not want to receive e-mail from us in the future, please let us know by sending an e-mail to peter@protectionbay.com.

With respect to cookies: We use cookies to record session information, such as items that consumers add to their shopping cart.

If you supply us with your telephone number we will only contact you if we have questions regarding an order you have placed on-line.

We do not share your information with anyone. This includes your e-mail address.

With respect to security: We always use industry-standard encryption technologies when transferring and receiving consumer data exchanged with our site.

We have appropriate security measures in place in our physical facilities to protect against the loss, misuse or alteration of information that we have collected from you at our site.

If you feel that this site is not following its stated information policy, you may contact us at the above addresses or phone number.

Suspicious sign in prevented

Suspicious sign in prevented

Suspicious sign in prevented

Suspicious sign in prevented
Suspicious sign in prevented

AVG

AVG
PROTECTION

COUNTER

computer

computer
hacked

KEYBOARDS watch

Laptops Shipped With Hidden Keylogger

came with a preinstalled program to capture the keystrokes

TAGS

TAGS

Devices , software , connection , network

M25G

M25G

Speed GUIDE

Speed  GUIDE
COMPARE WITH STANDARD

Computer Purchasing

Our Recommended Computer Specifications

Currently, ITS recommends that faculty, staff and students request the following specifications when buying new personal computers:

When ordering from the HP store ITS recommends purchasing from the EliteBook series for Laptops and from the EliteDesk series for Desktops. When purchasing from the Apple store ITS recommends purchasing from the MacBook Pro series for Laptops and from the Mac mini for Desktops.

  • Processor - dual core 2.4 GHz+ (i5 or i7 series Intel processor or equivalent AMD)
  • RAM - 16 GB
  • Hard Drive - 256 GB or larger solid state hard drive
  • Graphics Card - any with DisplayPort/HDMI or DVI support - desktop only
  • Wireless (for laptops) - 802.11ac (WPA2 support required)
  • Monitor - 23" widescreen LCD with DisplayPort/HDMI or DVI support - desktop only
  • Operating System - Windows 10 Home or Professional editions, or Apple OS X 10.12.3
  • Warranty - 3 year warranty - desktop only
  • Warranty - 4 year warranty with accidental damage protection - laptop only
  • Backup Device - External hard drive and/or USB Flash Drive
  • Please note: The extended warranties listed above must be added at the enhancement page when selecting your hardware for purchase.

Minimum Specifications

The current minimum computer specifications to ensure the ability to run the basic software most end users operate is:

  • Processor - dual core @ 2.4 GHz (i5 or i7 Intel processor or equivalent AMD)
  • RAM - 8 GB
  • Hard Drive - 320 GB 5400 RPM hard drive
  • Wireless (for laptops) - 802.11g/n (WPA2 support required)
  • Monitor - 19" LCD - desktop only
  • Operating System - Windows 7 with Service Pack 1 or Apple OS X 10.11
  • Backup Device - External hard drive and/or USB Flash Drive

Other Specifications

The majority of Clark's computing resources and backend systems are built on the Windows platform. Support is available for Apple's OS X operating system, but we currently do not provide support for the Windows operating system on an Apple computer. Since the choice between an Apple and a Windows system is usually a personal preference, we recommend that you come to campus with which ever operating system you are most comfortable with. If you have no preference, ITS recommends you contact the ITS Help Desk (helpdesk@clarku.edu) for purchasing advise. If you are coming to Clark with a particular program of study in mind, you may want to check with your academic department to see if they have a preferred computing platform.

Privacy is a myth !!! Your ISP usually Records your Browsing history.

Privacy is a myth !!! Your ISP  usually Records your Browsing history.
Your online activities is Open to the World.

os

os
windows overview

USB

USB
128 G

modem

modem
wireless

os

os
app

Browsers requirements

browsers*

Windows Browsers • IE 11 and higher • Firefox 31 and higher • Chrome Desktop 36 and higher Macintosh Browsers • Chrome 36 and higher Firefox 31 and higher • Safari 5 and higher iPad Browsers • Safari on iPad 4+ with iOS 6+

smart phones

smart  phones
iphone

massive data breach

massive data breach

Equifax says another 2.4 million victims were affected in massive data breach

Last year, Equifax discovered that 145 million consumers had their information stolen in a data breach. Now, a further 2.4 million Americans have been identified in the leak.

ELECTICITY REQUIREMENTS OF THE INTERNET

Berkeley Lab: It Takes 70 Billion Kilowatt Hours A Year To Run The Internet