New Year’s Resolution: Protect Your Computer

New Years Resolution blog post picBy Scott Aurnou

With the New Year come resolutions. If one of yours is to stay safer online, here are some tips:

Browse the Web with a non-administrative account. Computers come with primary user accounts featuring ‘administrative privileges.’ Those privileges allow full access to the computer, including the ability to download, modify and delete programs. While you need that to add, change or remove any software on your computer, you don’t need it to browse the Web. If an attacker is able to gain access to an administrative account, he or she will be able to control your system. To keep this from happening, set up a user account with non-administrative access to browse the Web (and limit the potential damage an attacker can do). Setting up these accounts isn’t difficult, though it varies from operating system to operating system. Here are links to set them up on a Mac, a Windows XP computer, a Windows Vista or Windows 7 PC, and a Windows 8 computer.

Keep your software up-to-date. Nearly all malware attacks target flaws in software that have already been fixed by the manufacturer via software updates. If you have downloaded and installed those updates, the vast majority of attacks against your computer will fail. Some programs can be set to update automatically and it’s always a good idea to take advantage of that. Another great way to ensure that your computer stays up-to-date is to use software that automatically updates other programs. Secunia’s Personal Software Inspector is an excellent choice for Windows-based computers. FileHippo is also very good and AppFresh can be used to keep software up-to-date on a Mac.
Read more ›

Tagged with: , , , , , , , , , , , , , , , , , , , , , , , ,
Posted in Laptops & Desktops, Network Security

Can a Fired Employee Access Your Network?


Computer Security Tip of the Week

Scott Aurnou – Whenever an employee leaves your company – however it happens – be sure to immediately rescind any form of access to your computer network. An ex-employee should never be able to affect your company’s data.

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel (and subscribe if you like).

Tagged with: , , , , , ,
Posted in Network Security, Security Tip of the Week

Are You Inviting Hackers to Attack Your Phone? Beware ‘Jailbreaking’ & ‘Rooting’


Computer Security Tip of the Week

Scott Aurnou – ‘Jailbreaking’ or ‘rooting’ a smartphone overrides the manufacturer’s settings… and makes the device a lot less secure. Should you allow them to connect to your work network?

If you enjoyed this video, you can see more on TheSecurityAdvocate YouTube channel (and subscribe if you like).

Tagged with: , , , , , , , , ,
Posted in Network Security, Security Tip of the Week, Smartphones & Tablets

How to Recognize (and Avoid Falling for) a Phishing Attack

Phishing Post Pic - Dec 2012By Scott Aurnou

‘Phishing’ is a method by which an attacker tries to trick you into revealing your personal, financial and/or log in information. Typical phishing attacks are often made via emails, websites, text messages and even automated phone calls (aka ‘robocalls’). These attacks will often look very convincing and contain web links leading to phony websites and/or bogus phone numbers to call. Some of them will also include attachments intended to infect your computer or device with malicious software (aka malware). Once your information has been stolen, it will either by used to impersonate or otherwise take advantage of you or simply sold online. Here are a few tips on how to identify a phishing attack and avoid having your information stolen.

Most phishing attacks aren’t obvious. Early phishing attempts were often clumsy and rife with typos, but more and more of the newer ones arrive as convincingly accurate-looking fake emails purporting to come from a trusted business like a bank, major airline, delivery service, PayPal, a governmental agency or even a work colleague. This is possible because a sender’s actual email address can be altered to appear as though the message is coming from someone else. Likewise, a different phone number can be made to show up on a call recipient’s caller ID. This process is called ‘spoofing.’
Read more ›

Tagged with: , , , , , , , , , , , , ,
Posted in Fraud & Scams, Laptops & Desktops, Smartphones & Tablets