- Security is generally a waste of time and money.
- I am too small or uninteresting to be a target of a cyber crime.
- Passwords are a hassle, so I keep them short and easy to remember.
- I like to use the same password for everything.
- I do not need to keep my anti-virus and anti-malware software up to date.
- I usually open email attachments and click on links in emails.
- I like to share personal details about my life, family, and vacation plans on Facebook and other social networks.
- I like to use cloud apps like DropBox and OneDrive for file sharing and storage.
- I am not concerned about things like whether my nanny camera, smart TV, or Internet router can be hacked.
- If I feel suspicious about something on the Internet, I usually ignore it because I don’t want to seem paranoid.
Score yourself. If your scored 1-2 points, there is hope, but things could be better. You might become a victim of cyber-crime. 3-5 means you are engaging in risky behavior, and are likely to become a victim. 6 and over means you are a frequent victim of cyber-attacks and regular visitor to the Geek Squad.
- Good security is usually less expensive than the cost of a breach or loss.
- You may be small, but there are beginner cyber-crooks starting every day. The are going to pick soft, easy targets.
- Password length of twelve or more characters is the only factor to prevent automated brute force password cracking,
- Reusing your password means if they get one password, they can get in everywhere else too.
- Anti-malware software is a first line of defense against remote access Trojans, keyloggers, and other malicious software exploits. New exploits are born daily, you anti-malware must be updated to keep up with the next exploit.
- Email links and attachments are the main way that cyber-criminals launch an exploit or campaign.
- Oversharing on social networks can give away information an attacker can use against you.
- Cloud apps can be great, but should be properly secured with long passwords and two-factor authentication.
- Most of the “smart” devices that are being sold have small Linux computers at their core, and very little if any security. These devices can be used to gain entry to your computer network, or to launch exploits like denial of service attacks. See my earlier post.
- Learn to listen to your feelings. Most scams are designed to change your emotional state to get you engaged. If you are feeling suspicious, worried, or uncomfortable, there is most likely a reason. This is your clue to end the session, and even call your IT support to report it.