Security Tips for 2014

Hackers-With-An-Agenda

Based on the number of different types of attack over the previous year (2013).  Pentura thought they would release a small list of possible actions and supporting programs/tools that can be used to secure your assets in 2014.

  1. Back-up your data. (OSX – Time Machine, Windows – Acronis Backup Software, Linux – many solutions)
  2. Don’t use public WiFi AccessPoints without a VPN (e.g. Cloak, OpenVPN to a home server)
  3. Configure your Smart-Phone to ‘prompt’ before connecting to any WiFi Network
  4. Increase the length and complexity of your passwords; use 2 factor authentication with you smart-phone or RSA fob where possible. Importantly: use a different password for each online account.
  5. Ensure you laptop uses suitable Full Disk Encryption (Windows – Truecrypt, Linux – LUKs, OSX -Filevault).
  6. Any remote-working connections should use an encrypted VPN solution.
  7. Laptops should utilise BIOS/UEFI/Firmware passwords.
  8. Don’t respond to unsolicited mails (SPAM); ultimately configure a mail-rule to junk all messages that contain the word “unsubscribe”.
  9. Don’t respond to mail from friends/family where the content is unlike their personality or is outside the norm of their usual style and content – it is likely that their account has been hacked, inform you friends and family ASAP by other means.
  10. Patching – ensure your system has all the latest security updates with automatic scheduled updates.  This also applies to your Smart-Phones and Tablets.
  11. Antivirus – this is rather a reactive solution, it will not protect you from zero-days (0-days) but can prevent the high possibility of infection from known malware,worms, trojans and variants.  Importantly: ensure you receive daily signature updates to detect all those new varients.
  12. Don’t store your credit card/banking information in an unencrypted form offline/online.

One more for office workers:

  1. Ensure you ‘Lock’ your workstation every-time you move away from your desk, even if your turning your back on your workstation.   The USB Rubber Ducky / colleague / malicious insider could be out to get you?