Computer Security Reminders

How Security Experts Are Protecting Their Own Data web link


  1. You really shouldn’t do anything you expect to be private or sensitive on a computer. Home computers are machines for convenience … sorry. Professional computers are a bit different.
  2. I am a professional Microsoft expert, but you shouldn’t use Microsoft technology for anything involving security. E-mail, files over the internet.
  3. Internet Security Programs and Anti-Virus don’t really protect your computer. Problem is, many Anti-Virus/Anti-Malware programs have security bugs themselves.
  4. You should still install Anti-Virus/Anti-Malware solutions because they automate the knowledge of security experts enough to be helpful despite not being 100%.
  5. Always backup your data. Never know when a virus/malware will wipe you out.
  6. Always use ad blocker technology when surfing the general web. Don’t use ad blockers if you are using a “throwaway” computer (from a security standpoint), you get more convenience.
  7. Distrust email, instant messages, web posts on your feed from unknown sources until you’ve verified the source.
  8. Do not assume any operating system (Linux vs Mac vs Windows) is more secure than the other. On the other hand, Windows tends to be less secure. On all systems, it takes just 1 security hole.
  9. If you run a Linux server, the responsible thing is to scan Linux for viruses. Linux may not get infected itself, but it can be a transmitter of viruses to less secure Windows machines.
  10. Diverse technology infrastructure makes it harder for security issues to propagate throughout the entire landscape of connected machines and devices. Mix up your OS, CPU, and hardware types.
  11. Try to surf the web inside a virtual machine. I admit, this is one of the most inconvenient security practices. Difficult to do consistently.
  12. Really good advice: 3 separate computers if you can. #1 online sensitive stuff (if you must) like banking/shopping, #2 social media, news, etc, #3 risky things like reading email, attachments, downloads.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.