If I were to write a GEICOŽ commercial for computer security, the punch line would be: "Don't be a terrorist".
I'm not trying to scare you - too much - but I think it's important that you be aware of the scams, tricks, hacks and threats that try to separate you from your money or steal your personal information, or make you an unwitting accomplice to hacktivists and terrorists.
That's why my e-letters focus so much on your computer's security.
Theoretically, your computer, and you by extension, could become a pawn in a terrorist attack against the United States if you don't take care of your computer's security.
How Hackers Could Use You
Consider, for instance, a terrorist group that infects thousands of computers with remote control software that allows the hackers to control those computers. What can the hackers do with those computers (known as zombies, with an army of zombies known as a botnet)?
It can use those computers to mount a coordinated attack against a specific target, such as an attack that floods the target network with so many simultaneous requests that the network - say the U.S. Department of Defense or a financial institution- is brought to a screeching halt.
Unable to access the network resources necessary for defense or business purposes, the country could be vulnerable during that time or investors and account holders could be prevented from performing necessary financial transactions.
Armies of infected computers, known as "bots", could bring down critical networked infrastructure such as power grids, nuclear plants or hospitals that would cause untold harm, even death.
Maintain Your Computers, and Yourself
Those scenarios, while difficult to pull off, are not far-fetched, and why it's so important to maintain anti-virus and anti-spam software and ensure that Windows and third-party software updates are installed on YOUR computers and devices such as cell phones and tablets.
Be don't rely on technology alone to protect you. You must be vigilant. The most sophisticated, expensive network defenses are of no value if the users behind them allow attackers through by clicking links and opening file attachments in unsolicited emails, or a host of other hacker tricks.
We are only as strong as the weakest link in our ever-more connected networks, and that includes us, as well as our machines.
For more information on this topic, visit the Read.gov web site's cyber attack web page at http://www.ready.gov/cyber-attack.