Linux Security

linux-logoIn our last post we may have introduced some of you to the idea of using Linux as a replacement for your Windows desktop or laptop.  Toward the end we touched on security, and this post will expand on that issue.

There is a fanatical cohort in the Linux realm that will tell you that Linux is secure by design and so security software is not necessary. And nobody is writing malware for Linux anyway.  And if there were malware, as a user you would have to agree to install and run it, and you wouldn’t do that, now would you?  (Would you?)  These people are similar to the Apple snobs out there that are promoting the same snake oil.

Well, let’s think about this for a minute.  The vast majority of web servers on the Internet are running some variety of Linux, and these are the same servers that the cyber-criminals are successfully exploiting to scoop up personal and financial information, and use for distributing malware and storing pornography.  This vulnerability sort of proves the point of this article. Sorry to say, in today’s world, you need to have your security up and running, whatever platform or operating system you are using.

So here is what you need to do with a Linux system:

  • Use anti-malware software.  As we mentioned in  our last post, it a good idea to install one of the available security programs from Kaspersky, Sophos, F Secure, or OPSWAT.  Many of these programs are free as well.
  • Use the iptables firewall that is built into Linux.
  • Keep Linux up-to-date.  Running updates in Linux is just as important as it is in Windows.
  • Use the latest version of your favorite web browser.  Linux will run Firefox, Chrome, or Opera.  Using the latest version keeps your security higher.
  • There are browser extensions that will improve your security as well.  Here are some to check out
  •  Use full disk encryption.  This is easily accomplished at the time of installation.  This way all your data, and even leaky things like temporary files and things you might overlook if you just used file encryption.

So if you are giving Linux some consideration, there is your recipe for security.

More information:


About the Author:

Cybersecurity analyst, pen-tester, trainer, and speaker. Owner of the WyzCo Group Inc. In addition to consulting on security products and services, Bob also conducts security audits, compliance audits, vulnerability assessments and penetration tests. Bob also teaches Cybersecurity Awareness Training classes. Bob works as an instruction for CompTIA’s non-profit IT-Ready Program in the Twin Cities. IT-Ready is a tuition free 8-week program designed to teach students of all ages the fundamentals of IT support to prepare them for an entry level position in Information Technology Support. Graduates of the classes take the exams to become CompTIA A+ certified. Bob is a frequent speaker at conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference2016, 2017, 2018, 2019, the (ISC)2 World Congress 2016, and the ISSA International Conference 2017, and many local community organizations, including Chambers of Commerce, SCORE, and several school districts. Bob has been blogging on cybersecurity since 2006 at

Add a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.