Top 10 Computer Security Mistakes

Published on: 30 August 2018 Last Updated on: 08 August 2019
Computer Security

So you’ve gone out and purchased a brand new laptop, and now you have plans of using that laptop in the workplace. Well, for anyone who has experience running a company, knows that laptops can be conduits for spyware and viruses. Once data is being processed, thought must go into who is capable of stealing it, where they might store it, how they could archive it, and how valuable the data is to the company.

Well, if you want to ensure you’re never in any unfortunate positions, then I suggest you check out my list of common mistakes most new computer users make.

 1. Connecting to an Unsecure Network

If the network is open, then it should be fine for you to connect to, right? I wouldn’t say that. You should always be suspicious of open networks, especially ones at hotels and airports. If it’s possible for you to connect to a network without using a password or agreeing to any terms, then there is a good chance you could be leading yourself into a trap.

 2. Opening Attachments from Unsolicited Emails

You want to check the content of your emails, if anything in it looks suspicious, or if the sender is asking you to do something that you do not feel comfortable doing then there is a good chance its spam.

Check the sender, if you’re not familiar with the person, then try searching for the email on any of the major search engines. If you’re at your workplace, then consider contacting your email administrator for verification on whether or not the email is spam.

3. Using Common Passwords

While the vast majority of people are wise enough not to fall into this trap, especially when signing up for services online, there are still many work colleagues that have a knack for using basic passwords, like their birthday or their username123.

You’ll want to re-work your password by combining uppercase letters, numbers and uncommon symbols. If you chose London as your password, then you could rejig it to something like L0nd3N. Even though it isn’t the most complex password, it would be much more difficult for a hacker to guess.

4. Not Making Backups

When it comes to archiving files, many end users make the common mistake of backing up data too infrequently. I can see how the lazy approach can be more comforting, but if your company files are that important to you, then you’ll want to ensure that they are backed up as often as possible, using a number of different mediums, such as the cloud, external hard drives, etc.

 5. Leaving Your Webcam Enabled

It’s a great idea for you to familiarise yourself with your webcam so that you can determine when it’s disabled or active. Hackers are very adept at hacking into your webcam, especially in the workplace, and they can even record meetings if you’re not careful. Covering the webcam with tape won’t do much since audio can still be recorded; it’s for this reason why you’ll want to ensure its disabled when not in use.

6. Searching the Deep Web

The deep web, unfamiliar to most internet users, is the shady part of it, not accessible from the major search engines like Bing and Google.

Work systems should be used for work only, there are many deep websites out there that will stick malicious code onto your computer and use that to track whatever you say and do.

7. Assuming Your Hard Drive Will Never Fail

In this world, there are two different kinds of computer users, those who have lost computer files and those who will eventually lose computer files. You want to back things up as often as you can. You also want to think about alternative media, like using an external hard drive to save certain confidential data onto it.

8. Using a Suspicious Thumb Drive

Everyone needs a place to store their work documents. If you’re in the office, it’s not uncommon for you to find a thumb drive lying around. My advice is not to use it, especially if you don’t know where it came from, that’s because there’s a good chance it could have a virus on it.

9. Using the Same Password across Accounts

It’s very important that you make a habit of changing your passwords. It’s not uncommon for end-users to keep the same password for many years. That is something you do not want to do.

For business-critical, sensitive data, you want to ensure that all passwords are changed at least once every three months.

Make sure all your accounts have different passwords. Having multiple passwords for your many accounts reduces the chances of all your accounts being compromised. With the increasing amount of cyber-attacks, the age of your password, along with its length and complexity are far more important today.

10. Agreeing to Install Anti-Virus Software

Have you ever visited a website that asked you whether or not you wanted to check your system for a virus? You may have asked how or why it knew you needed a virus scan. In most cases these prompts to install antivirus software are in fact attempts to install malicious software on your system.

Read Also :

Content Rally wrapped around an online publication where you can publish your own intellectuals. It is a publishing platform designed to make great stories by content creators. This is your era, your place to be online. So come forward share your views, thoughts and ideas via Content Rally.

View all posts

Leave a Reply

Your email address will not be published. Required fields are marked *

Related

Multimeter

Add Accuracy To Your Testing With The Help Of Multimeter

A multimeter is also known as a multi-tester. This small device helps you to find the accurate measurement of voltage, current, resistance, and power. With the help of an analog multimeter, you can troubleshoot the electrical problems with accuracy with the help of pointer on a scale. You can also use this multimeter in technical industries as well as in domestic appliances. You can use this multimeter for testing heavy motors, machines, wiring systems, and power supply and in home appliances like television, refrigerator, washing machine, air conditioner etc. Hence, it is a very useful device for both domestic and professional use. How do needle based multimeters work? The main work of needle based multimeter is to pass the current through a coil which is suspendedbetween two permanent magnets. After choosing the voltage scale, when the voltage is applied, a resistor of known value is placed in series with a measurement lead. This multimeter is a very sensitive piece of electrical testing device. It is common not only in home appliance installations but isalso very useful in servicing and repairs. Sometimes, when there is fluctuation in power supply this needle based multimeter gives you an accurate reading, which is not possible in the digital meter. Advantages of using the needle based multimeter: As you know that multimeters are of two types, analog and digital, the former one is very low in cost and available at every hardware store. You can get an accurate measurement by an analog meter, and you don’t even need a battery to operate it unless you have to measure the resistance. But in digital meters, you need a battery to operate it. While an analog meter needs DC power to measure resistance, it forces the current to flow in the capacitor and when it is stabilized, you will get the reading of the faulty wiring. How to check the voltage by an analog meter? If you want to check the voltage with the help of a needle based multimeter, you have to just follow a few tips. Thenumberto which the needle moves from 0 is known as “deflection “and full scale deflection is that goes till the end of the scale, anything beyond the scale is not measurable. In other words, this process is also known as full scale deflection. Users mostly drop the deflection part because it is rarely relevant anymore. Current measurement by an analog meter: Both AC and DC current can be checked with the help of needle-based multimeter by connecting the series in the meter in the circuit. For AC current measurement, an analog meter consists of diode rectifier that converts AC to corresponding DC current. Before measuring the current, one should consider the following: Insert the red and the black leads in their respective slot depending on very high or very low current measurements. Set range selector switch to DC current, and also select the expected range. Multimeter users can also ensure maximum range for measurements. They can also reduce the range if needed. Read Also: How To Get Started With Arduino Uno R3 Demystifying The Common GDPR Myths

READ MOREDetails
security controls

Top cloud security controls you should be using

Most organizations use at least some form of cloud storage, yet security issues are still a top concern. Data loss and security breaches are always in the news, with some of the most high profile data breaches to happen in 2018 so far including those that occurred at Reddit, Timehop, and FedEx. What this shows us is that even large companies can make mistakes that seriously compromise the security of their data. A 2017 survey conducted by Clutch revealed that while confidence in cloud storage security is high among small businesses, most are not doing enough themselves to protect their cloud storage. After all, cloud security requires involvement from the user, as well as the provider. We go over some of the top cloud security controls your business should be using to help ensure your data is adequately protected. Why do you need cloud security control? Every day, sensitive information continues to fall into the wrong hands. That’s according to Breach Level Index, as of August 2018. While cloud computing can be great for businesses, providing several benefits such as cost savings and data portability, it does come with certain information security risks. To protect your business against vulnerabilities, you need to put specific controls and standards into place. That’s where cloud security controls come in. They help to address, evaluate, and implement cloud security. They can include the following types of controls. Deterrent: These serve as a warning to potential attackers, warning of possible adverse effects if they were to proceed in their attempt, thereby helping to deter unlawful access. Preventative: These controls strengthen the system against attacks, protecting and managing vulnerable parts of the storage. Corrective: These help to reduce the consequences of an attack, which typically involves limiting damage. This could take place during or after the incident occurs. Detective: These controls will identify or detect an attack, and then respond to the incident. If an attack is detected, the detective control will signal to the corrective and preventative controls in an attempt to minimize damage. Using different types of controls will help to limit and prevent potential damage when using cloud storage solutions. What seems to be the problem? What businesses need to understand is that you cannot rely on your provider to do all the hard work. The issue is not that the cloud environment itself is insecure, but that customers are failing to configure their networks, applications, and data accurately. For instance, let’s take a look at what went wrong with Timehop. On 7 July 2018, the company was affected by a significant data breach that included email addresses, names, dates of birth, and phone numbers being taken. What was the issue? A cloud account that didn’t have multi-factor authentication. For Reddit, although they had two-factor authentication in place, their SMS-based authentication was not as secure as it needed to be. As for FedEx, the problem traces back to Bongo International LLC, a company bought by FedEx back in 2014, which had been storing sensitive client data on an open Amazon S3 bucket. The data had been available for public access for several years, having been collected from 2009 to 2012. Data can be put at risk in many different ways, so it’s essential to have the proper controls in place from the start. Find out what you are responsible for Many cloud services will offer some level of security. What companies need to do is find out exactly what they are responsible for when it comes to securing the data that is uploaded to the cloud. Ignorance is no excuse. Speak to your provider and find out which cloud security controls you are responsible for and what services they offer. Whatever tools are at your availability, make sure you use them all. Ultimately, you are responsible for securing your data, so take advantage of any security tools at your disposal, then make sure you take care of the rest. Limit cloud access A good way to reduce risk is to limit who has access to the sensitive information you are storing. Public cloud storage resources, such as Amazon’s S3 bucket, should not allow external access. Leaving SSH open is another common mistake. You should only allow those who must use the data directly to carry out their job to have access to the data. You can grant temporary access on an as-needed basis to any additional employees. Make the most of the identity and access control tools used by most major cloud providers, so you always know who has access to your data. When granting access, you have the option to limit what data someone has permission to access. Delegate appropriate permissions as needed and remove or disable accounts if an employee leaves the company. Keep your data secure One of the most common mistakes that companies make is to leave data unencrypted. You want to be sure that even if all other security measures fail, you have at least encrypted your data as a last measure of protection. While some providers offer encryption, companies should still use their own encryption techniques alongside these. Your decryption keys should remain within the company so that you can maintain control over these at all times. Learn from past mistakes Even large companies make mistakes when it comes to cloud security. You cannot merely rely on your provider to handle all aspects of security. Users need to ensure they are using current cloud security controls to ensure their data remains secure. The good thing is that we can learn from others’ mistakes. You can take extra precautions and implement certain controls and standards to improve security. Just make sure you pay attention to what is happening in the world of cloud security and update standards and controls accordingly. Read Also :  What You Are Paying For With A Virtual Data Room Top 10 Computer Security Mistakes

READ MOREDetails
Antique Cotton Harvester

5 Cool Antique Cotton Harvester

Cotton plants have been an integral part of the United States and American history since the first days of colonization. Along with tobacco and the gold and silver mines of South America, cotton was one of the most valuable exports which created an immediate demand in Europe, resulting in many investors funding some of the first communities to profit from cotton production. Cotton is a labor-intensive difficult crop to grow and harvest, unfortunately, slave labor was sued for much of the hardest aspects of the job. With that said, people are inclined to always “build a better mousetrap” and also have tried more efficient means of harvesting cotton. Although modern technology has made for much more efficient cotton machinery with an expected use for industrial farming, the simplicity and beauty of antique equipment can make for a fun hobby to restore and use on a smaller scale than what is required of commercial farms. Some have been designed as an attachment to be used with a regular tractor, essentially running the tractor in reverse with the large wheels to the front instead of the rear, others were made as independent designs specific for the single use of picking cotton and transporting it back to the barn to be cleaned by a cotton gin and baled as a separate process. Over the years, there have been some exceptionally cool ideas about how to pick cotton without the extensive labor required when people have to harvest by hand. 1820's: Trained Monkeys Nobody can argue how cool an idea it was when a Louisiana farmer had the idea in 1820 to purchase a group of money and train them to pick cotton. This almost sounds like a joke from a comedy movie, but the guy actually thought it might work. Spoiler alert, it didn't. He was able to teach them to pick cotton while in captivity, but when he released them into the fields to actually conduct the harvest, they quickly became distracted and ran off into the surrounding woods. Okay, the proof is in the pudding and maybe that wasn't a “great” idea, but such idiocy certainly brings a few giggles to nearly everyone when they hear the story. Patent Number 7,631, Subclass 48 Invented in 1850 by Samuel S. Rembert and Jedediah Prescott of Memphis, TN., the first cotton picking machine used cylinders and disks to pick cotton. The interesting aspect of the invention was it's being designed to add more units capable of harvesting more than one row at a time, a concept still used by modern harvesters. It didn't work well in terms of reliability because it required the operator to constantly stop and clean off the cotton oils as they jammed up the operating mechanisms, but it did prove such a machine was possible but needed some further development and improvement. 1930's: John Daniel Rust Rust invented one of the first usable cotton pickers in 1933, which didn't become commercially popular until 1938. It attached to the rear of a tractor and picked cotton without stripping it. Pictures show the tractor driver often holding the steering wheel to maintain a straight line while looking over their shoulder to evaluate how the harvest was proceeding. This was the machine that made mechanical cotton pickers an integral aspect of cotton farms, as they could produce as much cotton in an hour as had previously been expected after a day's worth of labor. The patent was sold in the 1940s and used by different companies before becoming an outdated machine, even though some of the most basic concepts it used are still part of modern cotton pickers, with a few upgrades and improvements to details of the harvest process. 1940's International Harvester Model 114A The I.H. Model 114A was one of the first cotton picking specific machines, and set a new standard for cotton farmers when it came out in 1943. The problem with previous mechanical harvesting was it didn't always clean the cotton efficiently enough to go straight to the cotton gin for separation. The 114A resolved that problem and reliably picked cotton while removing unopened bolls and other debris which would clog a gin. By doing so, the amount of labor required during a cotton harvest was immensely lowered while increasing production rates. With a growing demand for cotton worldwide both as a fabric and for other uses such as in cooking oil or rubber products, such an invention had become an absolute necessity toward a farm's continued success in the cotton industry. 1950 I.H. M120 Cotton Picker The I.H. M120 basically added a cotton picker to a tractor in a means which would turn the tractor into a specialized piece of machinery used only to pick cotton. It essentially turned the tractor around to drive with the large wheels in the front behind the spindles which harvested cotton one row at a time. The steering wheel and seat were moved to face what is generally considered the rear of the tractor, and the basket was mounted over the engine hood. Although modern cotton pickers operate much the same way with rear-wheel steering, they do more than just picking the cotton but also strip and bale the crop. It's interesting to see how that design began and how it has evolved over time. Certi-Pik USA Parts and Equipment If you're fortunate enough to find an antique cotton picker, it's likely going to be in a condition that requires restoration, and that's going to require parts. At Certi-Pik, we provide certified aftermarket OEM parts for modern and older cotton machinery according to your needs; we're specifically certified by John Deere and Case/IH. Although we also sell parts for many other makes of cotton picker and tractor equipment. Our staff is trained and understands both the mechanical needs of your equipment and the importance of getting it fixed as quickly as possible to avoid downtime in the field. We can provide advice if you have questions about which part will best fix any problem your equipment may be having. Contact us for all your aftermarket parts needs so we can help you achieve your goals of producing a successful and profitable cotton crop each year. Read Also: How Does Modern Technology Propel The Success of Your Business? Ten Ways Technology is Impacting Modern Education How Cutting Edge Technology is Helping Dubai Improve its Healthcare Services

READ MOREDetails