{"id":5310,"date":"2012-09-22T21:04:40","date_gmt":"2012-09-22T11:04:40","guid":{"rendered":"http:\/\/tomgrimshaw.com\/tomsblog\/?p=5310"},"modified":"2024-07-07T07:47:13","modified_gmt":"2024-07-06T21:47:13","slug":"hackers-reveal-10-pc-security-mistakes-we-all-make","status":"publish","type":"post","link":"https:\/\/www.tomgrimshaw.com\/tomsblog\/?p=5310","title":{"rendered":"Hackers Reveal 10 PC Security Mistakes We ALL Make"},"content":{"rendered":"<p>No one knows security mistakes better than hackers &#8211; because for them, tiny errors in security are the \u2018keys\u2019 that allow access to home PCs and office computer systems.<\/p>\n<p>And hackers are clear about one thing. Computer users make mistakes all the time &#8211; and often the same ones, over and over again. Two hackers &#8211; one \u2018ethical hacker\u2019, who tests computer systems by attempting to break into them, and one ex-hacker who now works in security &#8211; lay bare the ten errors that crop up most often.<\/p>\n<p>\u2018People are too trusting,\u2019 says Tom Beale, who has worked as an \u2018ethical hacker\u2019 for 10 years, protecting corporate and government systems by finding weaknesses.<\/p>\n<p>\u2018The human element is always the weak link in the chain. People are very easily distracted &#8211; and particular attackers prey on that.\u2019<\/p>\n<p>\u2018People are just getting more and more stupid,\u2019 says Cal Leeming, an ex-hacker who was convicted for a cyber crime, but now works in computer security.<br \/>\n\u2018They want their stuff to be protected, but they expect someone else to do it for them. People don\u2019t want to know. Even for companies, computer security isn\u2019t a priority, because it\u2019s not a primary source of income. It\u2019s only once the company\u2019s been hit that they realise, &#8220;Oh we should have paid more attention than that&#8221;.\u2019<\/p>\n<p>1. Don\u2019t use the same username everywhere<br \/>\n\u2018People often upload photos of themselves to an online library, say,\u2019 says Cal Leeming, a former hacker who works in security at Simplicity Media, \u2018But they use a username they use on other sites. They don\u2019t realise that people can use Google to connect them across all the different worlds they visit, and then work out a way in.\u2019<\/p>\n<p>2. Don\u2019t trust public wi-fi<br \/>\n\u2018When you go on a public wi-fi network you have no way to determine whether it\u2019s a real network run by a reputable company, or a fake run by a spotty guy next to you,\u2019 says Tom Beale of Vigilante Bespoke. &#8216;The problem\u2019s particularly bad on mobile, where you really can\u2019t tell if you\u2019re on a fake network set up to steal your data. If you\u2019re going to use public networks for business, use a laptop, because the browser will warn you of security breaches &#8211; your phone won\u2019t.\u2019<\/p>\n<p>3. Be careful about who you friend on Facebook<br \/>\n\u2018Facebook has been basically forced to implement privacy settings,\u2019 says Cal. \u2018But people still get it wrong. They randomly friend other people, not realising they are giving away information that could be useful in a cyber attack &#8211; for instance names of pets or family that might be a password or security question.\u2019<\/p>\n<p>4. Don\u2019t trust people you don\u2019t know<br \/>\n\u2018I always tell people to do an \u2018offline test\u2019 &#8211; ie would you do the same thing if you were offline? So for instance, if you\u2019re chatting to someone online, and you tell them some information, would you give that information to someone you\u2019d just met in a bar?,\u2019 says Tom. \u2018Online, you\u2019re even LESS safe &#8211; because you may not be talking to who you think you are. People just seem to lose all concept of reality when they\u2019re on a PC.\u2019<\/p>\n<p>5. Use two-factor passwords when you can<br \/>\n\u2018People resist this except when they\u2019re made to do it &#8211; like by their bank,\u2019 says Tom. \u2018But it does add that extra layer. It does offer protection. People accept that their bank will use tokens or keycard readers, but when other sites add it, people resist it &#8211; they just want quick access.\u2019<\/p>\n<p>6. Don\u2019t re-use your email password<br \/>\n\u2018This isn\u2019t going to be a problem that goes away any time soon,\u2019 says Cal. \u2018People don\u2019t realise what are the risks of using the same password. If you reuse your email password, you\u2019re handing out the keys to be hacked and breached &#8211; giving hackers access to the information they\u2019ll need to hack your bank account and other networks you use. People use simple passwords for convenience &#8211; memorising too many is just a pain.\u2019<\/p>\n<p>7. Don\u2019t be fooled by \u2018cries for help\u2019<br \/>\n\u2018Some of the most effective attacks are &#8220;cries for help&#8221; from friends &#8211; sent by email from a compromised machine. It\u2019s incredible how many people respond to that,\u2019 says Tom. \u2018If it\u2019s someone who travels a lot, and their email is hacked, it\u2019s more convincing when you get an email saying that they are stranded abroad, and need money. They target people with a scattergun approach, but when they find someone who IS abroad a lot, it\u2019s very effective.\u2019<\/p>\n<p>8. Use antivirus software<br \/>\n\u2018I can\u2019t see any reason why you wouldn\u2019t run AV software,\u2019 says Tom. \u2018It\u2019s not a Holy Grail, but it helps you to deal with most known problems. Browsing without it is like driving without a seatbelt. It\u2019s your first layer of defence, whether you\u2019re using PC, Mac or Android.\u2019<\/p>\n<p>9. Remember that funny videos can be very unfunny<br \/>\n\u2018Facebook\u2019s system doesn\u2019t filter for malicious links, so they can be very dangerous. Often a \u2018video\u2019 link will try to fool people into visiting an infected site or downloading something in the guise of video software or fake antivirus software. Your only defence is to think, \u2018Would my friend really post that?\u2019 so be careful about people you only half-know. Facebook and Twitter need to inform users better.\u2019<\/p>\n<p>10. Set everything to auto update<br \/>\n\u2018Attackers will be actively looking for vulnerabilities &#8211; not just in your operating system, but in your browser, in plug-ins such as Flash and Java. Be sure that all of those are up to date,\u2019 says Tom. \u2018If you don\u2019t, you are leaving security holes. Most updates don\u2019t add functions, they just fix holes, and if you don\u2019t get them, you still have the holes.\u2019<br \/>\n<a href=\"http:\/\/uk.news.yahoo.com\/hackers-reveal-10-pc-security-mistakes-we-all-make.html \" target=\"_blank\" rel=\"nofollow noopener\"> http:\/\/uk.news.yahoo.com\/hackers-reveal-10-pc-security-mistakes-we-all-make.html <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>No one knows security mistakes better than hackers &#8211; because for them, tiny errors in security are the \u2018keys\u2019 that allow access to home PCs and office computer systems. And hackers are clear about one thing. Computer users make mistakes all the time &#8211; and often the same ones, over and over again. Two hackers &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.tomgrimshaw.com\/tomsblog\/?p=5310\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Hackers Reveal 10 PC Security Mistakes We ALL Make&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-5310","post","type-post","status-publish","format-standard","hentry","category-computer-tips-basic","category-general-interest"],"_links":{"self":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts\/5310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5310"}],"version-history":[{"count":3,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts\/5310\/revisions"}],"predecessor-version":[{"id":55440,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=\/wp\/v2\/posts\/5310\/revisions\/55440"}],"wp:attachment":[{"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tomgrimshaw.com\/tomsblog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}