{"id":515,"date":"2015-08-10T14:24:54","date_gmt":"2015-08-10T22:24:54","guid":{"rendered":"http:\/\/www.checkworks.com\/blog\/?p=515"},"modified":"2015-08-10T14:24:54","modified_gmt":"2015-08-10T22:24:54","slug":"the-first-thing-we-do-lets-kill-all-the-hackers","status":"publish","type":"post","link":"https:\/\/blog.checkworks.com\/index.php\/the-first-thing-we-do-lets-kill-all-the-hackers\/","title":{"rendered":"The First Thing We Do, Let&#8217;s Kill All the Hackers"},"content":{"rendered":"<div id=\"attachment_516\" style=\"width: 635px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.checkworks.com\/blog\/wp-content\/uploads\/2015\/08\/bigstock-Large-group-of-people-that-are-69430267.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-516\" class=\"wp-image-516 size-large\" src=\"https:\/\/www.checkworks.com\/blog\/wp-content\/uploads\/2015\/08\/bigstock-Large-group-of-people-that-are-69430267-1024x1024.jpg\" alt=\"Large group of people that are seeking security protection , internet , identity theft , home protection concept.\" width=\"625\" height=\"625\" srcset=\"https:\/\/blog.checkworks.com\/wp-content\/uploads\/2015\/08\/bigstock-Large-group-of-people-that-are-69430267-1024x1024.jpg 1024w, https:\/\/blog.checkworks.com\/wp-content\/uploads\/2015\/08\/bigstock-Large-group-of-people-that-are-69430267-150x150.jpg 150w, https:\/\/blog.checkworks.com\/wp-content\/uploads\/2015\/08\/bigstock-Large-group-of-people-that-are-69430267-300x300.jpg 300w, https:\/\/blog.checkworks.com\/wp-content\/uploads\/2015\/08\/bigstock-Large-group-of-people-that-are-69430267-624x624.jpg 624w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/a><p id=\"caption-attachment-516\" class=\"wp-caption-text\">.<\/p><\/div>\n<p class=\"western\">\n<p class=\"western\">By MJ Plaster<\/p>\n<p class=\"western\">You know the line from <i>King Henry the Sixth<\/i> even if you\u2019ve never read a word of Shakespeare: \u201cFirst thing we do, let\u2019s kill all the lawyers.\u201d Here we\u2019re talking about black hat hackers, the ones that wreak havoc with computer networks and Internet sites around the world. I\u2019m probably next on their list after that headline, but how else can I tempt you to read vital information that could save your business?<\/p>\n<p class=\"western\"><!--more--><\/p>\n<h2 class=\"western\">Quantifying the Threat<\/h2>\n<p class=\"western\">It\u2019s bad enough that we have to guard against <a href=\"https:\/\/www.checkworks.com\/blog\/index.php\/phishing-for-dollars-internet-scamsters-gone-wild\/\">phishing and 419 scams<\/a> at home, but hacking is a 24\/7\/365 threat for businesses. Most of it comes from outside the United States, so there\u2019s no recourse. Visit <a href=\"http:\/\/map.norsecorp.com\/\">Norsecorp.com<\/a> for a real-time glimpse into hacking activity across the globe.<\/p>\n<p class=\"western\"><a name=\"_SG_3402b5fc205c410db244c10cf8aed709\"><\/a> Computer insecurity goes beyond a simple IT threat; it\u2019s a business threat, especially since your customers\u2019 personal information is at risk.<\/p>\n<p class=\"western\">There is no surefire defense against \u201cmalevolent actors\u201d of any stripe. But you can deter garden-variety hackers by making your network less attractive to hackers.<\/p>\n<p class=\"western\"><a name=\"_SG_2d2a1482d1e44f91a6ea53d2b3e89395\"><\/a> If you don\u2019t have an IT person on staff to lock down your network, waste no time in finding an <a href=\"https:\/\/www.checkworks.com\/blog\/index.php\/the-ins-and-outs-of-outsourcing-2\/\">outside source<\/a>. Playing defense is dangerous, and remember, \u201cDone is better than perfect,\u201d because perfect doesn\u2019t exist.<\/p>\n<h2 class=\"western\">Put It on Paper<\/h2>\n<p class=\"western\">Start by ensuring that your written computer security policy is up-to-date. Just as important as preventive steps is the \u201cor else\u201d clause. You have to tie infractions to consequences and clearly state them in your policy. Without consequences, your policy is a toothless tiger.<\/p>\n<h2 class=\"western\">Passwords\u2014the Devil\u2019s in the Details<\/h2>\n<p class=\"western\">We\u2019re more than a quarter century into the computer generation, and people are still using \u201c1234\u201d or \u201cpassword\u201d for their passwords. That\u2019s insane!<\/p>\n<p class=\"western\">The best password is a <i>passphrase<\/i> (multiple words) that includes uppercase and lowercase characters, numbers and special characters (if allowed). <a href=\"https:\/\/lastpass.com\/generatepassword.php\">Password generators<\/a> create strong passwords, but if you need a sticky note on your monitor to help you remember passwords, it defeats the whole purpose.<\/p>\n<p class=\"western\">Password managers solve the problem without breaking the bank. Two good password managers are <a href=\"https:\/\/lastpass.com\/generatepassword.php\">LastPass<\/a> and <a href=\"https:\/\/www.dashlane.com\/\">Dashlane<\/a>. Dashlane adds an additional feature to change all passwords assigned to an individual with a single click.<\/p>\n<h2 class=\"western\">Beyond OS Updates, Anti-Virus Software and Firewalls<\/h2>\n<p class=\"western\">You\u2019ve installed a firewall and an anti-virus program. That\u2019s nice, but it\u2019s like saying you wash your face and brush your teeth in the morning. Do you update those programs and system software automatically? Do you update your hardware\u2019s firmware?<\/p>\n<p class=\"western\">While there\u2019s a slight danger that an update may cause problems, when a bad update comes out, a corrective update is usually on its way before you can let loose a string of expletives.<\/p>\n<h2 class=\"western\">Squash Malware<\/h2>\n<p class=\"western\"><a name=\"_SG_cf9bf1a65845442ba56a0aaa6555e7e7\"><\/a> Malware is shorthand for \u201cmalicious software.\u201d <a href=\"https:\/\/www.av-test.org\/en\/statistics\/malware\/\">AV Test<\/a>, an independent IT institute, captures malware activity and reports 390,000+ new malware programs <i>every day<\/i>. If you click the link and look at the graph, you\u2019ll see how rapidly malware programs have grown over the past decade.<\/p>\n<p class=\"western\">Malware includes:<\/p>\n<ul>\n<li>Worms\u2014self-replicating code that can fill every speck of storage<\/li>\n<li>Keyloggers\u2014code that capture your keystrokes to a log file, which the perpetrators download<\/li>\n<li>Ransomware\u2014code that locks your computer or encrypts your data until you pay a ransom<\/li>\n<li>Spyware\u2014trackers that track and report Internet activity for advertising and other purposes<\/li>\n<li>Hijackers\u2014change your home page, search engine and other defaults<\/li>\n<\/ul>\n<p class=\"western\">Anti-virus software doesn\u2019t catch all malware, and no malware program catches everything. Run several anti-malware programs, with <i>only<\/i> one of them running resident (in the background)\u2014and update religiously. Then run a scan once a week with the programs you don\u2019t run in the background.<\/p>\n<p class=\"western\">Have you ever wondered why there\u2019s so much freeware available? Don\u2019t just click through the installation screens without reading them. Often you\u2019re offered the \u2018opportunity\u2019 to install one or more add-ons\u2014with embedded spyware.<\/p>\n<p class=\"western\">After each new program installation, check your installed programs in the Control Panel to see if anything slipped through during the installation process.<\/p>\n<p class=\"western\"><b>Intercept Special Deliveries<\/b><\/p>\n<p class=\"western\">Spam is a prime carrier for malware, often through graphics. Some ISPs filter obvious spam before it hits your inbox. Microsoft Outlook, by default, downloads email without images and requires users to download them manually. Since spyware and pornography can enter your computer through email images, keep the Outlook default setting and download images only in emails that come from trusted sources.<\/p>\n<p class=\"western\"><b>Lockdown Browsers<\/b><\/p>\n<p class=\"western\">Browsing the Internet can leak information from computers to goodness-only-knows whom. We\u2019ll assume you\u2019re using a standard browser rather than some of the <a href=\"http:\/\/www.techworld.com\/security\/the-best-5-secure-browsers-2015-3246550\/2\/\">ultra-secure, stripped-down browsers<\/a>. Set your browser preferences to delete cookies and history each time you close the browser, and don\u2019t trust the browser\u2019s privacy setting. You\u2019ll do better with browser add-ons.<\/p>\n<p class=\"western\">The add-ons below may not work with every browser. If not, search for one that offers comparable features for your browser. Add-on links are available from the add-on search feature in your browser. The list below is a bare-minimum list, and I use them all.<\/p>\n<ul>\n<li>Add Block Plus and Add Block Pop-ups combo\u2014blocks ads and popup adds<\/li>\n<li>Better Privacy\u2014removes super-cookies, called Local Shared Objects or LSOs, which are not deleted when you close your browser<\/li>\n<li>Disconnect\u2014speeds up browsers while stopping tracking by 2000+ sites<\/li>\n<li>Ghostery\u2014shuts out \u201cthe invisible Web,\u201d trackers, beacons, etc.<\/li>\n<li>Self-destructing cookies\u2014removes cookies when you close a tab<\/li>\n<li>HTTPS Everywhere\u2014encrypts information sent from your browser through a secure connection<\/li>\n<li>NoScript\u2014prevents scripts from running, but you can whitelist trusted sites<\/li>\n<\/ul>\n<p class=\"western\">Some of the add-ons are redundant, but aren\u2019t you glad that airplanes have triple redundancy on most systems? You will have to disable some add-ons occasionally to view a page properly, but it\u2019s worth the inconvenience.<\/p>\n<p class=\"western\">Finally, connect to the Internet through a virtual private network (VPN) such as Private Internet Access. <a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2403388,00.asp\">VPNs<\/a> allow you to \u201ctunnel\u201d through their network to your destination. Your destination sees their IP, not yours. You don\u2019t \u201cexist.\u201d<\/p>\n<h2 class=\"western\">Is Your Head in the Cloud?<\/h2>\n<p class=\"western\"><a href=\"https:\/\/digitalguardian.com\/blog\/27-data-security-experts-reveal-1-information-security-issue-most-companies-face-cloud\">Digital Guardian<\/a> confirms what I have suspected from the moment \u201cthe cloud\u201d was announced\u2014it\u2019s the No. 1 security threat to business. Here\u2019s why:<\/p>\n<ul>\n<li>Can you trust a company full of complete strangers with your data and your customers\u2019 data?<\/li>\n<li>How secure is the provider\u2019s environment?<\/li>\n<li>What \u201crights\u201d to your information does the provider claim?<\/li>\n<\/ul>\n<h2 class=\"western\">Free Upgrade to Windows 10<\/h2>\n<p class=\"western\">There\u2019s some confusion over who gets a free Windows 10 upgrade. Check with <a href=\"http:\/\/www.microsoft.com\/en-us\/windows\/windows-10-upgrade\">Microsoft<\/a> to see if you qualify.<\/p>\n<p class=\"western\">Before you jump at the chance to upgrade, you need to understand that, by default, you agree to share a wealth of information with Microsoft when you agree to the <i>40+-page<\/i> Terms of Service. As you click through the setup screens, you need to change numerous defaults to avoid sharing information with Microsoft and third parties.<\/p>\n<p class=\"western\"><a name=\"title_1\"><\/a> Word on the street is that Windows 10 is a solid product that has gone through many, many hours of testing with a very large pool of testers. Newsweek tells the other side of the story in \u201c<a href=\"http:\/\/www.newsweek.com\/windows-10-recording-users-every-move-358952\">Using Windows 10? Microsoft Is Watching<\/a>.\u201d Until we have reviews from a large group of actual users, take everything you hear with a salt lick.<\/p>\n<h2 class=\"western\">Rogue Employees<\/h2>\n<p class=\"western\">If Edward Snowden can walk (fly) away with NSA\u2019s treasure trove of highly guarded secrets, imagine what rogue employees can download to their mobile devices through your Wi-Fi connection. Be careful about permissions\u2014who has access to what areas of the network. Review network activities of privileged accountholders and lower privileges if necessary.<\/p>\n<h2 class=\"western\">Lock Out the Dearly Departed<\/h2>\n<p class=\"western\">Do the ghosts of employees past haunt you network? When departing employees hand over their keys to the building, company identification and credit cards, you need to remove their computer access.<\/p>\n<p class=\"western\">In the end, you want to be able to prove that a breach of customer data was not due to neglect. Aside from that, you\u2019ll sleep easier knowing you\u2019ve done your best to thwart hackers from ruining your day.<\/p>\n<p class=\"western\">\n","protected":false},"excerpt":{"rendered":"<p>By MJ Plaster You know the line from King Henry the Sixth even if you\u2019ve never read a word of Shakespeare: \u201cFirst thing we do, let\u2019s kill all the lawyers.\u201d Here we\u2019re talking about black hat hackers, the ones that wreak havoc with computer networks and Internet sites around the world. I\u2019m probably next on [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[64],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/posts\/515"}],"collection":[{"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/comments?post=515"}],"version-history":[{"count":2,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/posts\/515\/revisions"}],"predecessor-version":[{"id":518,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/posts\/515\/revisions\/518"}],"wp:attachment":[{"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/media?parent=515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/categories?post=515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.checkworks.com\/index.php\/wp-json\/wp\/v2\/tags?post=515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}