{"id":1,"date":"2021-01-10T09:00:51","date_gmt":"2021-01-10T09:00:51","guid":{"rendered":"https:\/\/starshot.tw\/?p=1"},"modified":"2021-01-12T08:57:21","modified_gmt":"2021-01-12T08:57:21","slug":"4-ways-compsec-pros-protect-their-computers","status":"publish","type":"post","link":"https:\/\/starshot.tw\/2021\/01\/4-ways-compsec-pros-protect-their-computers\/","title":{"rendered":"4 ways compsec pros protect their computers"},"content":{"rendered":"\n
Computer and network security: Everyone knows they should be doing it better, but no one really knows all the best ways to do it. The computer security profession is a large and varied one, so \u2014 obviously \u2014 opinions vary about best practices and solutions. But believe it or not, everyone agrees on the single-most effective way to keep your computer safe in our digital era: Don\u2019t use a computer.<\/p>\n\n\n\n
Unfortunately, that\u2019s not really practical for most people. So instead, we snooped around for what measures computer security professionals use to secure their own machines. (Obviously, one of the best measures is not to release all <\/i>of your security methods, so we got the cream of the crop.) The skills and knowledge of being an expert computer security professional can take years to learn, but it\u2019s always possible to glean a few tidbits of knowledge from the pros.<\/p>\n\n\n\nTake online security seriously and respond quickly<\/h4>\n\n\n\n
News outlets were buzzing after an article published on medium.com<\/a> nailed Panera Bread to the wall for failing to address a massive user data breach for eight months. That breach allowed anyone to view customers\u2019 full names, addresses, dietary preferences, and email addresses. Their IT team didn\u2019t fix it and their leadership didn\u2019t handle it when it was brought to their attention. That\u2019s not exactly the example to follow.<\/p>\n\n\n\n Whether you\u2019re speaking in terms of public relations, data security, or loss of productivity, there\u2019s never been a more important time to take digital security seriously. You wouldn\u2019t leave your car running in a parking lot while you went inside for half an hour, so don\u2019t leave your (and potentially your customers\u2019) data vulnerable online.<\/p>\n\n\n\n We were actually surprised by this consensus opinion. It\u2019s so simple, yet, we\u2019ve all been guilty of clicking \u201cRemind me Later\u201d when some program wants to update. There\u2019s a reason that software is updating: Its team of dedicated, expert programmers have patched something<\/i>. Many times, it\u2019s a security loophole or some part of the program that allows a vulnerability into your system.<\/p>\n\n\n\n With that said, do something you might never have done \u2014 read the release notes. Figure out exactly what the update intends to fix, and then head to the forums. See what other people are saying about the risks involved with the update. If you\u2019re already behind a version, then take a moment to weigh whether or not to update to, yes, yet, another version that might also have holes. That\u2019s what the pros do.<\/p>\n\n\n\n Remember when security experts found a flaw in High Sierra? That\u2019s the perfect example. You might have dodged a bullet by not updating, but not without checking the news.<\/p>\n\n\n\n It may be hard to believe that one of the most important lessons of online and network security is performing software updates as soon as possible, but it\u2019s one of the best ways to keep your computer and network safe. It\u2019s almost<\/i> always a hassle, but it\u2019s definitely <\/i>always worth it.<\/p>\n\n\n\n Every CompSec pro is privy to the basic, fundamental rule of network security: The Principle of Least Privilege, which basically asks \u201chow few<\/i> permissions can you give each user?\u201d Yeah, needing to ask your IT team to turn on your speakers because of insufficient permissions is incredibly annoying \u2014 no one knows better than the IT team. But by keeping everyone\u2019s permissions as restricted as possible, you minimize potential problems, including your own.<\/p>\n\n\n\n Imagine your network like a house and a hack like a break-in.<\/p>\n\n\n\n Example 1: You have valuables in every room of the house, but there are no doors to those rooms. Whether a thief breaks in through the window, the garage, or by picking the front door, they can get at everything by breaking in once.<\/p>\n\n\n\n Example 2: Every room in the house has a locked door, and all valuables are placed inside safes. If our thief gets into one room, they can\u2019t get to the hallway and into another room, and they might not even get anything out of that room.<\/p>\n\n\n\n Obviously, it seems a little paranoid to live that way. But, let\u2019s face it, CompSec pros are a little paranoid. Keep your \u201crooms\u201d locked, put your valuables in a safe place, and when you throw a party, close it all up. In other words, administer your network with multiple user permission levels and restrict accesses carefully, based on how few permissions can be doled out.<\/p>\n\n\n\n You know what the scariest part of working in 2018 is? It\u2019s entirely possible that next time you turn on your computer, every file on it could be lost. There are hacks that hold your hard drive irretrievably hostage, there are environmental disasters that ruin your servers\u2026 even a simple burglary can make accessing your data impossible. Are you prepared for that?<\/p>\n\n\n\n Performing a backup of essential files and storing that backup somewhere geographically different from your hard drive could mitigate most security failures. There\u2019s a lot to learn about how to keep computers and networks safe, but knowing how to retrieve stolen, lost or hacked files could be a lot easier and maybe just as important.<\/p>\n\n\n\n Update software, backup your data, and restrict user accesses \u2013 those three steps alone could potentially save you and your company hundreds of hours and millions of dollars. But in all of these examples, what you and your network security team should be asking is, \u201cDo we even know what our company\u2019s policy is?\u201d These tips don\u2019t even scratch the surface of everything there is to learn about computer and network security<\/a>, but good security starts by asking questions and finding out the answers.<\/p>\n\n\n\n Last tip: With all that said, don\u2019t feel bad if you\u2019re doubting your company or team is doing enough with security measures. When asked, \u201cWhat do security professionals do to secure their personal computers?,\u201d almost all network security professionals have the same answer: Not enough. You can always do more<\/i>, so get started today!<\/p>\n\n\n\n Via: CBTNuggets<\/p>\n","protected":false},"excerpt":{"rendered":" Computer and network security: Everyone knows they shou […]<\/p>\n","protected":false},"author":2,"featured_media":160,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[7],"tags":[9,11,10],"class_list":["post-1","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-quick-tips","tag-cbtnuggets","tag-computer","tag-tips"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/starshot.tw\/wp-json\/wp\/v2\/posts\/1"}],"collection":[{"href":"https:\/\/starshot.tw\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/starshot.tw\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/starshot.tw\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/starshot.tw\/wp-json\/wp\/v2\/comments?post=1"}],"version-history":[{"count":2,"href":"https:\/\/starshot.tw\/wp-json\/wp\/v2\/posts\/1\/revisions"}],"predecessor-version":[{"id":2459,"href":"https:\/\/starshot.tw\/wp-json\/wp\/v2\/posts\/1\/revisions\/2459"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/starshot.tw\/wp-json\/wp\/v2\/media\/160"}],"wp:attachment":[{"href":"https:\/\/starshot.tw\/wp-json\/wp\/v2\/media?parent=1"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/starshot.tw\/wp-json\/wp\/v2\/categories?post=1"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/starshot.tw\/wp-json\/wp\/v2\/tags?post=1"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}Update your software \u2014 now, not later!<\/h4>\n\n\n\n
Be miserly with your permissions!<\/h4>\n\n\n\n
Prepare for the worst: Do your backups<\/h4>\n\n\n\n