I talk quite a bit about computer viruses and computer security on this site. It’s probably one of the bigger problems that I grapple with for my customers. Today I’m going to talk about the biggest computer security vulnerability there is. In fact, this is a general security vulnerability. It doesn’t affect a specific operating system or piece of software. It’s also the MOST attacked and exploited vulnerability in all of computing.
Yes, the computer user is usually the weakest link in the computer security environment.
Social Engineering is what is referred to as the computer cracker con-man’s best tool.
Take this example. The phone rings, “hi I’m from _yourisp_, we’ve had a problem here with some of our mailservers and need to get some information from you about your username and password.” Ok, many home users have to scratch for the information, but is the caller really from your isp, don’t they know that information? Unfortunately some people are gullible enough to bite.
This is, in many ways, no different from the phishing attacks that we see. A message claiming to be from your bank asking you to login and “verify” your account information.
OK, let’s say it’s a business environment. Hi, I’m the new computer tech guy and was asked to install some software on your machine….. oh, I didn’t realize… well, ok.
I’m sometimes amazed when I go into a business and explain to a new face that I’m there to look at their computer and many without question to me or anyone else will say ok and let me in to the keyboard. Of course, I’m not going to install trojans or backdoors, I’m always at businesses for a legitimate call. It is a bit amazing when you consider how easily some will accept the story at face value without batting an eye.
The bottom line here is to try and check with someone who knows whether or not the person should be there. Is he really the new tech guy, call the IT desk and ask to verify. If you’re only there some days, but suspect that other people know him, check with someone that should have met them.
The next element of security fault you might present is the choosing of passwords. Usually dictionary or name based passwords are TERRIBLE security wise because they can easily be cracked by an automated, dictionary-based password cracking tool. “But it’s hard for me to remember something else.” Try this approach, think of a phrase…. let’s see….
“ask not for whom the bell tolls, it tolls for thee”
Let’s use the first initials of words to make a password…
ok, not bad, better than bell (or belltolls).
Let’s try substituting numbers that sound like words (four/for)
That looks much better. It appears fairly random, would be tougher to crack and probably easy to remember. In fact even without the phrase some folks might have it memorized in about 4-6 uses.
One important note. Be careful about leaving passwords taped to the monitor, keyboard or in close proximity to the computer. That is VERY obvious, even if you don’t specify PASSWORD.
Think about what you throw away. Did you just through out your login information into the trash or did it get shredded before going out. Don’t underestimate the advantage that a cracker could gain by any detail of information about network layout, usernames, internal software. As we might have seen in the article on google’s use in cracking there are lots of bits of data that can be gleaned from a search engine that could be useful for a cracker. (If you followed the links you’ll be certain to have seen some great examples.) One such is computer system software audits. This would detail the version of the Operating system and all software installed. A literal goldmine for an attacker looking for a foothold in the network.
Another avenue is web pages. Let’s say we go to a site and something pops up saying “you have a virus – click here to remove”. Wow, I guess I better do what it says. Stop and look. Is it in a web browser window, what does the title look like. Is it very flashy and eye-catching or is it something more like what you’ve seen your antivirus software warn with before. I’ve seen people fall for this as an ad and on the click, a piece of software downloads and installs that is more of a headache than some of the real viruses. If in doubt, close that window and any others, open a new browser session and visit Trendmicro’s online antivirus scan
Beyond that stop and think anytime a website tries to automatically download software.
Be cautious, be “web smart” and don’t let yourself be the weak link in the security of your pc.
Related PostsRelated Posts
- Network Security guide for the home or small business network - Part 11 - Why? Alright, so you're still reading this series and you're thinking. Look, I'm not protecting national security secrets. All I'm doing is (running a business|emailing my grandkids|using the web for research). True, good point. You're not at the defense department. OK. Let's say you just use your computer for email and......
- How To Remove Alpha Antivirus (Removal Guide) There is a new rogue among us. It appears that Alpha Antivirus has replaced Personal Antivirus as one of the latest rogue security programs. This particular rogue installs through online "scans" (popups.) The reason I say "scans" is they're essentially animations of a scan (every one that visits the site......
- The basics Well to start out, this might should be crosslinked in the computer security section, but I'm putting it in commentary primarily to catch those who might not typically look at computer security. First, why should you care about keeping your computer secure? I've heard people ask something like this. Usually......
- Wireless Broadband Internet-whether It Is LAN Or WAN Service-is Associated Having A Wireless broadband Internet-whether it is LAN or WAN service-is associated having a number of diverse myths. These typically center on security and need to do with anxiety about how info is transmitted over a wireless connection and, furthermore, need to do with concerns about eavesdropping, in several cases. You will......
- Web Design-Great Style Practices Your web site is where your company resides -- it is like the headquarter of an offline business. Therefore, it's important to practise good style rules to make sure your site reaches out towards the maximum quantity of visitors and sells to as numerous people as you possibly can. Make......
- Significant Things To Remember Before You Buy Your Business Plan Software Most people, who plan on buying any kind of software, will search for the reviews online. If you are looking to buy good business plan software, you should do the same. There are plenty of such reviews on the Internet today. But only some of them can be helpful. Many......
- Windows XP lost administrators password
- Network Security guide for the home or small business network – Part 10 – use good passwords
- Google Talk on Linux using wine
- Varying Degrees of Password Security
- Park Your Virus Impervious Smugness Mac (and Linux) Users