Quick and Simple Security Tips

Welcome to the Fast-Air Tech Talk newsletter. The Tech Talk newsletter is a free service for all Fast-Air customers.

While there might be 50 ways to leave a lover, there are thousands of ways to improve computer security.

Understand that security is not a single, all-in-one solution. Security is a never-ending strategy of using many different layers of protection.

One of the first steps is to be a tad paranoid. There are a significant number of people in the world who are indeed “out to get you.” At least through computers. A computer device, which includes phones and all Internet of Things devices, is easy pickings for a savvy criminal.

Keep devices updated with the latest security patches. Sadly, this is impossible with many devices. The best approach for such devices is voting with the pocket book — just don’t buy poorly supported computers.

All computer devices should be using a firewall, either built-in or as a separate device. Most consumer grade routers have built-in firewalls, but remember that a firewall alone will not protect a device that is not updated and patched. Remember that router built-in firewalls only protect against general intrusions into a network.

All operating systems support software firewalls. Even when using a network firewall, use the built-in firewall too.

Much debate exists about whether anti-malware software remains useful. Nonetheless, for many users, anti-malware software seems to be a necessary evil. Keep the software updated and patched.

Avoid as much as possible using root or administrative login accounts. Instead use non-root or standard user accounts. Using a non-root or standard user account means various administrative tasks, including installing software, requires acknowledging password prompts. These simple prompts help avoid malware from being launched automatically.

When multiple people use the same computer, use separate non-root or standard user login accounts for each user. Should a device be compromised the separate account limits the extent of the damage.

Use passwords and always use different passwords for each need. Passwords do not need to be horribly complicated but they provide a necessary layer of security. While some users have narrowly focused needs and heightened security requirements, most people should not be afraid of writing passwords on paper. Just keep the paper out of normal everyday sight and away from dogs and cats.

A simple way to recognize disguised links for files and email file attachments is to enable the operating system’s display of file extensions. That way a fake PDF is more easily recognized when the file is actually an EXE file.

Never blindly open email attachments. Emails are easily spoofed to look like the sender is a known person.

Configure web browsers not to use third-party cookies. Third-party cookies are used for one purpose — tracking.

Configure web browsers to use cookie white lists. A while list dramatically limits what cookies can be stored in a web browser.

Use session-only cookies as much as possible.

Configure web browsers to use JavaScript white lists. JavaScript is a common avenue for malicious attempts at compromising a computer system. Do not confuse JavaScript with Java.

Configure web browsers to disable pop-ups. Or at least use any such related feature to create a white list of which web sites can use pop-ups.

Never connect to a web site that requires personal information or passwords unless using HTTPS.

Use an ad blocker. A significant amount of malware is installed through advertising web sites.

Never download software on a whim. Always research software to verify the app is reputable. Even then, only download software from known safe and reputable locations.

Do not download software from download web sites. Almost always the respective installers come with bloatware and PUPs — potentially unwanted programs.

Install only necessary software. The less that is installed the less that needs to be updated and patched and the less that can be compromised.

Learn some basics of social engineering, which is a common method used to trick people into revealing information.

Avoid dancing pigs. Don’t click on every single link in the world.

Avoid web sites that are known for being malware magnets.

Do not reply to emails offering the latest and greatest in malware prevention. Such emails are spam and links to malware.

Learn to use BCC rather than CC when sending emails to multiple people.

Think twice — thrice — before posting pictures and personal information online.

Do not save credit card information with online vendors. Always type the card information fresh with each order.

If possible, segregate computer usage such that if a single computer is compromised other computers or devices are not affected. This requires some computer savvy or outside help, such as creating virtual networks (virtual LANs or VLANs) to isolate Internet of Things devices from the remainder of a network.

Another segregation approach is to use one computer for general web surfing and another for other tasks a such as office work and personal finances. The latter computer has far less chance of being compromised.

Have some kind of backup strategy. This is a sane idea even outside basic security because computers often fail and data is easily lost. A common proverb among computer professionals is preparing for when a hard drive fails and not if a hard drive fails.

A significant number of past Fast-Air newsletters contain detailed information about security. All issues are available online.

Family time: What is the mathematical result of multiplying the number 111,111,111 by itself? Hint: use paper and pencil because electronic calculators display the result using exponential notation.

Catch Me If You Can!
Video

Latest posts by Backwoods Geek (see all)