How good is your computer security?
Cyber criminals are more sophisticated than ever. They are
breaking into companies, banks and government organizations for financial gain and to steal documents, secrets and intellectual property.
They are also breaking into our home computers and laptops to steal our personal information and data.
Companies, banks and governments have a lot of resources they can dedicate to cyber security defense. And they still get broken into.
Although companies selling us computers don't seem to care much about our security, there is a lot we can do ourselves to increase our computer security.
With the right computer security software, critical awareness of the dangers lurking on the Internet, and correct behavior and techniques, you can protect your computer and personal information from cyber criminals and thieves.
Many cyber thieves, like their real world counterparts, are opportunists. They look for targets that are highly profitable and require little effort and risk. Unsecured computers, easy-to-guess passwords and general lack of attention while browsing on the Internet leave you open to attacks and make their life easier.
At the same time, new technology products are being developed and at an ever-increasing pace. Security is often an afterthought because technology companies rush product development to outsell one another in a highly-competitive technology market.
The products we use are not secure, and cyber criminals are there to take advantage of it.
This leaves us - consumers of technology - to fend for ourselves.
How can we increase our computer security to protect our personal information and data and lower the risk of someone breaking into our computer, email account or online service like a bank website?
Here is a robust strategy:
Rather than putting all your energy in preventing an attack, focus on making it more difficult and time consuming for a cyber intruder to break into your computer. Putting multiple obstacles in the intruder’s path buys you time and wastes theirs.
In the old days, people built castles and fortresses to defend their territory. Castles had multiple lines of defense: reconnaissance patrols for early enemy detection, difficult ground surrounding the castle, moats, high walls and multiple armies strategically placed around the territory.
In computer security the multiple lines of defense are created by using different software programs and having good backups (something people back in a day didn't have - if their castle was broken into, they died!)
The goal is to make the cyber criminals discouraged. They are opportunists, and if your computer is secure enough, they will go break into the next one.
This is called defense in depth. It is a military strategy and you can use it to your advantage.
By setting up multiple layers of defense using several independent methods, you can:
The more protection layers you use...
...the more you will increase the security of your computer, tablet and mobile phone.
Let's summarize. Cyber criminals are:
Companies making products:
Our computer security plan is to: