{"id":2650,"date":"2017-01-16T11:49:59","date_gmt":"2017-01-16T16:49:59","guid":{"rendered":"http:\/\/dansdigitaldive.com\/web\/?p=2650"},"modified":"2017-01-16T12:01:45","modified_gmt":"2017-01-16T17:01:45","slug":"cyber-security-for-the-home-user","status":"publish","type":"post","link":"https:\/\/dansdigitaldive.com\/web\/archives\/2650","title":{"rendered":"Cyber Security for the home user"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2651\" src=\"https:\/\/i0.wp.com\/dansdigitaldive.com\/web\/wp-content\/uploads\/2017\/01\/cyber-security-1721673_1280.jpg?resize=187%2C187&#038;ssl=1\" alt=\"\" width=\"187\" height=\"187\" srcset=\"https:\/\/i0.wp.com\/dansdigitaldive.com\/web\/wp-content\/uploads\/2017\/01\/cyber-security-1721673_1280.jpg?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/dansdigitaldive.com\/web\/wp-content\/uploads\/2017\/01\/cyber-security-1721673_1280.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/dansdigitaldive.com\/web\/wp-content\/uploads\/2017\/01\/cyber-security-1721673_1280.jpg?resize=768%2C768&amp;ssl=1 768w, https:\/\/i0.wp.com\/dansdigitaldive.com\/web\/wp-content\/uploads\/2017\/01\/cyber-security-1721673_1280.jpg?resize=1024%2C1024&amp;ssl=1 1024w, https:\/\/i0.wp.com\/dansdigitaldive.com\/web\/wp-content\/uploads\/2017\/01\/cyber-security-1721673_1280.jpg?resize=50%2C50&amp;ssl=1 50w, https:\/\/i0.wp.com\/dansdigitaldive.com\/web\/wp-content\/uploads\/2017\/01\/cyber-security-1721673_1280.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"auto, (max-width: 187px) 100vw, 187px\" \/>Recently I received an email from a readers board that I&#8217;m a member of; the site was hacked. \u00a0That sucks, now I have to around and change all my passwords again! \u00a0This coupled with all the news of the Russian hacking, I thought it might be a good time to go over a couple of things. \u00a0I&#8217;m going to attempt to cover a lot of ground today without writing a book, so bear with me. There is a real good reference site called Laws.com (<a href=\"http:\/\/cyber.laws.com\">http:\/\/cyber.laws.com<\/a>). \u00a0First, let&#8217;s go over a couple of definitions:<\/p>\n<p>1. Cyber Security: (Also called computer or IT security) The protection of computer systems from theft or damage to their hardware, software or the information on them, as well as from disruption or misdirection of the services they provide. I liked this definition from <a href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_security\">Wikipedia<\/a>.<br \/>\n2. Hacking: The practice of modifying or altering\u00a0computer software and hardware to accomplish a goal that is considered to be outside of the creator&#8217;s original objective (Ref: <a href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_security\">Whatishacking.org<\/a>). Those who do the hacking are called &#8220;Hackers&#8221; which makes sense. Lifewire published a good, <a href=\"https:\/\/www.lifewire.com\/definition-of-hacking-817991\">easy to read explanation of\u00a0hacking<\/a>.<br \/>\n3. Computer Virus:\u00a0A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document. \u00a0I liked this definition from <a href=\"https:\/\/us.norton.com\/internetsecurity-malware-what-is-a-computer-virus.html\">Symantec&#8217;s website<\/a>.<br \/>\n4. Malware:\u00a0Short for &#8220;malicious software,&#8221; malware refers to software programs designed to damage or do other unwanted actions on a computer system. In Spanish, &#8220;mal&#8221; is a prefix that means &#8220;bad,&#8221; making the term &#8220;badware,&#8221; which is a good way to remember it (even if you&#8217;re not Spanish). \u00a0Ref: <a href=\"http:\/\/techterms.com\/definition\/malware\">TechTerms<\/a>.<\/p>\n<p>I&#8217;m not about to cover government and industrial cyber security. \u00a0There are a lot of very well paid people who do that. \u00a0I&#8217;m going to be chatting about how you and I, the average Joe&#8217;s, can protect ourselves from jerks and the occasional Russian anarchist.<\/p>\n<p>First secure you&#8217;re online presence. \u00a0Visit <a href=\"https:\/\/www.leakedsource.com\/main\/\">LeakedSource<\/a> to find out if your email, name, or phone number has been compromised. \u00a0If you&#8217;ve been compromised; visit those sites and change your passwords. This opens\u00a0a whole new\u00a0set of problems. Passwords suck; I can never remember mine and constantly lock myself out of my own computer (Hint, the solution is NOT an excel spreadsheet). \u00a0To make a safe password, it should be long (&gt;12 characters)\u00a0and it should avoid names, places, dictionary words and personally identifiable information. \u00a0Sounds easy? \u00a0It&#8217;s not. \u00a0LIfeHacker had a \u00a0good <a href=\"http:\/\/lifehacker.com\/four-methods-to-create-a-secure-password-youll-actually-1601854240\">article on passwords<\/a> a couple of years ago, and you know what? \u00a0It&#8217;s still relevant today. \u00a0I <u>highly encourage<\/u> anyone looking to replace their passwords to review this article.<\/p>\n<p>Next, secure your internet connection to your computer. \u00a0Wired connections are easier to secure than wireless. \u00a0The advantages of being wired physically is twofold. \u00a0Control over the network and network speed. If you have the choice, I recommend you read this dated; but once again, still relevant article on <a href=\"http:\/\/www.computerweekly.com\/feature\/Wired-vs-wireless-in-the-enterprise\">Computer Weekly<\/a>.<\/p>\n<p>Let&#8217;s face the facts though. \u00a0As a home user, chances are pretty darn high that you&#8217;ll have some wireless devices. \u00a0What should you do? \u00a0There is a good article by <a href=\"https:\/\/www.cnet.com\/how-to\/home-networking-explained-part-6-keep-your-network-secure\/\">cNet<\/a> about setting up a router. \u00a0A couple of things to do &#8220;right out of the box:&#8221;<\/p>\n<p>1. Name your network\u00a0(without identifiable info) and encrypt your Wi-Fi network! \u00a0When naming your network (the router&#8217;s SSID), do not use any information that would identify you. \u00a0Also, do not use the default name as it may contain clues as to the equipment, which a hacker could use to break into your network. \u00a0Make sure to set up your Wi-Fi security using a strong password (See above). \u00a0I recommend using the strongest security available on most\u00a0routers (Currently WPA2 and WPA).<br \/>\n2. Change the default settings. \u00a0If you use the default settings, you may allow your router to be susceptible to unauthorized users. \u00a0View the <a href=\"https:\/\/www.cnet.com\/how-to\/home-networking-explained-part-6-keep-your-network-secure\/\">cNet article, step 2<\/a>.<br \/>\n3. Turn off the remote access features and turn on the router&#8217;s firewall, if available. \u00a0If you have a firewall in your router,<a href=\"https:\/\/www.lifewire.com\/practices-for-managing-your-network-firewall-2487252\"> read this<\/a>\u00a0on how to set it up.<br \/>\n4. Update the routers firmware, and finally&#8230;<br \/>\n5. Log out of your router properly!<\/p>\n<p>Next, secure your personal computer. \u00a0Make sure your computer&#8217;s Operating System (OS) is up to date and has the latest updates. \u00a0Turn on your firewall if you haven&#8217;t already.<\/p>\n<p>Finally, If you do not run security scans of your computer; shame on you. \u00a0If you need a virus protection program, there are plenty of free ones out there, and check with your internet service provider, they may provide a top tier program\u00a0for free, mine does. \u00a0Set up your virus &amp; malware to automatically scan emails and downloads (i.e. real time scanning). \u00a0I also recommend performing a &#8220;quick scan&#8221; weekly. \u00a0I usually run a &#8220;deep scan&#8221; about once every month, give or take a major holiday. \u00a0Granted, running manual scans of your computer will not prevent an infection that has already occured. \u00a0It&#8217;s like calling the Police; it is reactionary. \u00a0Hopefully it will be able to pull out the infection and repair any damage.<\/p>\n<p>There is a lot of information out there, I hope this little tidbit helps someone. \u00a0Now, if I could just remember my password&#8230;.(they should have an app for that). \u00a0What say you? \u00a0Do you have a list of best practices that you&#8217;d like to share with my loyal feline?<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently I received an email from a readers board that I&#8217;m a member of; the site was hacked. \u00a0That sucks, now I have to around and change all my passwords again! \u00a0This coupled with all the news of the Russian &hellip; <a href=\"https:\/\/dansdigitaldive.com\/web\/archives\/2650\">Continued<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"kt_blocks_editor_width":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[9,10,8,48],"tags":[68,58,91,59,70],"class_list":["post-2650","post","type-post","status-publish","format-standard","hentry","category-computing","category-household","category-life","category-recommendations","tag-crime","tag-home","tag-responsibilities","tag-security","tag-technology"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":825,"url":"https:\/\/dansdigitaldive.com\/web\/archives\/825","url_meta":{"origin":2650,"position":0},"title":"Mail Bag &#8211; Freedom and Liberty Hijacked","author":"DR D","date":"December 13, 2012","format":false,"excerpt":"Good morning Boys and Girls.\u00a0 This is the first reader who has written using the \"What's on you mind\" link.\u00a0 Here's what he(she?) had to say: Our Freedoms and Liberty have been Hijacked. I'm tired the fruits of my labor are being stolen by \"the state\". When being robbed by\u2026","rel":"","context":"In &quot;Politics&quot;","block_context":{"text":"Politics","link":"https:\/\/dansdigitaldive.com\/web\/archives\/category\/politics"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":866,"url":"https:\/\/dansdigitaldive.com\/web\/archives\/866","url_meta":{"origin":2650,"position":1},"title":"Is your hard drive REALLY defragged?","author":"DR D","date":"February 27, 2013","format":false,"excerpt":"Good morning everyone!\u00a0 Today's post is all about keeping your digital house in order. As you all know, I'm kind of a prick when it comes to keeping your computer clean and free of bugs.\u00a0 As I commonly state, \"Safe computing has a lot in common with safe sex, cleanliness\u2026","rel":"","context":"In &quot;Computing&quot;","block_context":{"text":"Computing","link":"https:\/\/dansdigitaldive.com\/web\/archives\/category\/computing"},"img":{"alt_text":"A very cluttered hard drive","src":"https:\/\/i0.wp.com\/dansdigitaldive.com\/web\/wp-content\/uploads\/2013\/02\/DrD-Defrag-300x195.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":15061,"url":"https:\/\/dansdigitaldive.com\/web\/archives\/15061","url_meta":{"origin":2650,"position":2},"title":"In-Decision 2024 \u2013 Presidential Election 2024","author":"DR D","date":"October 17, 2024","format":false,"excerpt":"Today, my cat was telling me to start writing again.\u00a0 So, to shut him up; I\u2019m stealing the name of a segment from the \u201cDaily Show,\u201d as I\u2019m sure you\u2019re aware, it sums up this year\u2019s election cycle quite nicely. As you all know, one of the primary purposes of\u2026","rel":"","context":"In &quot;Politics&quot;","block_context":{"text":"Politics","link":"https:\/\/dansdigitaldive.com\/web\/archives\/category\/politics"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/dansdigitaldive.com\/web\/wp-content\/uploads\/2013\/11\/2013-11-05_08-28-25_109.jpg?fit=688%2C689&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/dansdigitaldive.com\/web\/wp-content\/uploads\/2013\/11\/2013-11-05_08-28-25_109.jpg?fit=688%2C689&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/dansdigitaldive.com\/web\/wp-content\/uploads\/2013\/11\/2013-11-05_08-28-25_109.jpg?fit=688%2C689&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":2555,"url":"https:\/\/dansdigitaldive.com\/web\/archives\/2555","url_meta":{"origin":2650,"position":3},"title":"Rest in Peace Swift","author":"DR D","date":"October 10, 2016","format":false,"excerpt":"On October 1, 2016 the HSV-2 Swift, a proof of concept ship, was severely damaged in a missile attack off the coast of Mokha, Yemen. \u00a0A friend of mine served on her while the ship was under the\u00a0US Navy. \u00a0He said she was a fine ship and a delight to\u2026","rel":"","context":"In &quot;Life&quot;","block_context":{"text":"Life","link":"https:\/\/dansdigitaldive.com\/web\/archives\/category\/life"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":15065,"url":"https:\/\/dansdigitaldive.com\/web\/archives\/15065","url_meta":{"origin":2650,"position":4},"title":"Virginia vs. the Fed\u2026. Who\u2019s got the better case?","author":"DR D","date":"October 26, 2024","format":false,"excerpt":"Recently, the governor of Virginia, Glen Younkin, ordered the removal of 1600+ individuals from Virginia\u2019s voting roster.\u00a0 These 1600+ people were previously identified, and are known non-citizens.\u00a0 According to the governor\u2019s press secretary, \u201c\u2026everyone who was removed from the voter roll [has] 14 days to come back and demonstrate that\u2026","rel":"","context":"In &quot;Politics&quot;","block_context":{"text":"Politics","link":"https:\/\/dansdigitaldive.com\/web\/archives\/category\/politics"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/dansdigitaldive.com\/web\/wp-content\/uploads\/2016\/03\/virginia_Seal.jpg?fit=300%2C300&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":913,"url":"https:\/\/dansdigitaldive.com\/web\/archives\/913","url_meta":{"origin":2650,"position":5},"title":"An experiment in Timesharing: 2013 Timeshare Journey &#8211; May","author":"DR D","date":"April 17, 2013","format":false,"excerpt":"We begin the month of May at Wyndham Patriots Place in Williamsburg, VA (simulated of course). Mid month we are scheduled to transfer to McGaheysville, VA, where we will spend two weeks.\u00a0 on 5\/24 we leave for TN; headed to Crossville, TN for a couple of weeks. The resort in\u2026","rel":"","context":"In &quot;Timeshares&quot;","block_context":{"text":"Timeshares","link":"https:\/\/dansdigitaldive.com\/web\/archives\/category\/travel\/timeshare"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/dansdigitaldive.com\/web\/wp-json\/wp\/v2\/posts\/2650","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dansdigitaldive.com\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dansdigitaldive.com\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dansdigitaldive.com\/web\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/dansdigitaldive.com\/web\/wp-json\/wp\/v2\/comments?post=2650"}],"version-history":[{"count":3,"href":"https:\/\/dansdigitaldive.com\/web\/wp-json\/wp\/v2\/posts\/2650\/revisions"}],"predecessor-version":[{"id":2654,"href":"https:\/\/dansdigitaldive.com\/web\/wp-json\/wp\/v2\/posts\/2650\/revisions\/2654"}],"wp:attachment":[{"href":"https:\/\/dansdigitaldive.com\/web\/wp-json\/wp\/v2\/media?parent=2650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dansdigitaldive.com\/web\/wp-json\/wp\/v2\/categories?post=2650"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dansdigitaldive.com\/web\/wp-json\/wp\/v2\/tags?post=2650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}