You Can't Buy Computer Security -
It's a Process, Not a Product
You think you're safe because: *You have a firewall that separates and protects your network from the Internet; *You have an anti-virus/anti-spyware/anti-spam solution to protect your computers from malicious software and junk email; *You keep your computers up-to-date with the latest security patches; *You use good passwords; and *You think-Why would a hacker care about us? We're not a target! Guess what? You aren't as safe as you think you are. Here's why: *No piece of security hardware or software is 100% effective; *Many breaches of security come from within because of a disgruntled employee or an employee leaving to work for your competition; *Hackers and scam artists are working overtime trying to install malicious software or to fool you into providing confidential information; and *Most hackers don't care about you but they do want to take over your computers to send out email spam, distribute illegal movies and music, or to attack other computers and networks. What should you do? *You still need the basics. Use a good firewall; install anti-virus/anti-spyware/anti-spam solutions; stay current with security patches; follow best practices; and monitor and manage your server, workstations, and network. *Be a little paranoid. Hackers use social engineering techniques to fool you into a false sense of security. They pretend to be a trusted source such as a colleague, vendor, friend, or family member. Hackers even make their malicious programs and websites look familiar, going so far as to duplicate the exact look of something you trust such as your bank's website. *Read carefully. Sometimes a hacker will send you an email that looks legitimate - maybe even something you 'd expect from a familiar website. But look closely at the web links to make sure they are spelled correctly. For example, some hackers sent out an email with links to paypa1.com. Note the "1" instead of an "l" in the address. *Ignore Unsolicited Requests. No reputable bank or vendor will send you an unsolicited email asking you to verify confidential information by sending them your Social Security number, credit card information, mother's maiden name, ID, or your password. *Only use a trusted computer. If you have to enter confidential information, including your ID and password, only use a computer you trust and know is managed and safe. Avoid using computers at the library, a hotel business center, your neighbor's house, and even avoid using outside family member's computers. Any of these computers could be infected with a malicious keystroke logger to capture your password. And most important... *Ask before you act. If in doubt (even a little), contact Tobin Solutions before you open an attachment, install software, or do anything else you feel uneasy about and may later regret. |