- The Foundry: Conservative Policy News from The Heritage Foundation - http://blog.heritage.org -

Let the User Beware: You're Responsible for Your Cybersecurity

Posted By David Inserra On August 8, 2012 @ 4:00 pm In Security | Comments Disabled

[1]

It is said that a wise man learns from the mistakes of others. If that is the case, the U.S. would be wise to learn from the scary story of Mat Honan, a senior writer at the technology news publication Wired. Honan is a technologically savvy guy, but with only a few pieces of easily attainable information, hackers effectively destroyed his digital life [2]. His iPhone, iPad, and Mac were completely erased, his email account deleted, and his Twitter feed used to send vulgar messages. Luckily, the hackers were not interested in his bank accounts, but merely hacking for laughs, or “lulz.”

Seeking the facts, Honan actually contacted his hacker and received a step-by-step account of how easy it was for the hacker to accomplish all of this. His colleagues at Wired were able to replicate these steps, showing just how easy it is to steal sensitive information and infiltrate a computer.

For individuals, this is an important lesson in personal cyber awareness and cyber hygiene. For many online, it is easy to think of all the benefits of the Internet—nearly all the information you could want at your fingertips, email, easy access to banking, financial, or other personal accounts, social media—but forget the risks that technology brings. There are cyber criminals out there who want steal your money or your identity, and there are hackers who simply want to mess with you. Regardless, Americans should make sure they are doing common-sense things to protect themselves online.

Cybersecurity legislation [3] recently died in the Senate [4], but no amount of laws or regulations can secure individuals’ computers. Individuals bear the responsibility to make sure they are taking steps to reduce their risk online. Businesses would be wise to make sure their employees are educated in cyber threats, so as to avoid costly and embarrassing hacks.

Here are a few things everyone can do to lower their risk online:

  1. Create better passwords. Passwords should not be the first cute answer that jumps into your head. Longer passwords are better (at least eight characters) and should use numbers and other symbols. Also, avoid using the same password for every account you own, and change your passwords occasionally.
  2. Beware of phishing and malware. Suspicious emails, pop-ups, or websites that want you to download a file or ask for personal information should be avoided. Using a trusted anti-virus program can help detect and remove potential threats. Watch out for sophisticated attacks that disguise themselves to look like someone or some organization you know. Send a separate email to the person or organization to check on its legitimacy.
  3. Consider double layers of security. Some organizations, like Google, offer a second layer of security [5]. Consider using such options as a firmer way of protecting your accounts.
  4. Update older programs. Older operating systems and Web browsers have security vulnerabilities, which may have been solved by an update or a new release of the software. Upgrading often will allow you to take full advantage of all the security upgrades the software developers are making.
  5. Back up your information. No security is foolproof. Consider buying an external hard drive or using a cloud-based service such as Dropbox [6] or Carbonite [7] to help save your data in the event of computer loss.

The fact that it happened to a knowledgeable guy like Mat Honan should serve as ample reason for each American to make sure they are doing the right things to better protect themselves on the Internet.


Article printed from The Foundry: Conservative Policy News from The Heritage Foundation: http://blog.heritage.org

URL to article: http://blog.heritage.org/2012/08/08/let-the-user-beware-youre-responsible-for-your-cybersecurity/

URLs in this post:

[1] Image: http://blog.heritage.org/wp-content/uploads/personal-computer-cyber.jpg

[2] destroyed his digital life: http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/

[3] Cybersecurity legislation: http://www.heritage.org/research/reports/2012/07/cybersecurity-act-of-2012-revised-cyber-bill-still-has-problems

[4] died in the Senate: http://blog.heritage.org../../../../../2012/08/02/the-president-shouldnt-override-the-congress-on-cybersecurity/

[5] layer of security: https://support.google.com/accounts/bin/answer.py?hl=en&topic=1056283&answer=180744&rd=1

[6] Dropbox: https://www.dropbox.com/

[7] Carbonite: http://www.carbonite.com/en/

Copyright © 2011 The Heritage Foundation. All rights reserved.