Only deal with reputable companies that you know and trust

At the very least be sure the company has a physical address and phone number. If you haven’t done business with the company before, visit the Better Business Bureau online (http://www.bbbonline.org) and do some research. Check the company’s website for feedback from previous customers. April 18, 2013
Don’t tell anybody your password This warning includes your systems administrator, who NEVER needs your password. One day I received an e-mail from “Support

View the Original article

Just because your company’s spam filter, virus filter and other defenses let an email through, doesn’t mean it’s harmless

Last year, one organization narrowly avoided a virus infestation. Alerts led them to the email in-boxes of the virus authors. To sneak in a virus, hackers used encrypted zip files, which went past filters because they couldn’t be scanned. The organization caught it with the very last line of defense — desktop antivirus software, which triggered after the users had plugged in the password to see the zip file contents! Had the bad guys written something new, instead of using off-the-shelf script kiddie code that was in standard pattern files, there could have been a major outbreak. Long story short: End-user awareness about email and attachments is every bit as important as antivirus filters and firewalls. EVERY USER is an important part of hacker defense! April 19, 2013
Only deal with reputable companies that you know and trust At the very least be sure the company has a physical address and phone number. If you haven’t done business with the company before, visit the Better Business Bureau online (http://www.bbbonline.org) and do some research. Check the company’s website for feedback from previous customers. April 18, 2013
Don’t tell anybody your password This warning includes your systems administrator, who NEVER needs your password. One day I received an e-mail from “Support

View the Original article

Use a password in only one place.

Reusing passwords or using the same password all over the place is like carrying one key that unlocks your house, your car, your office, your briefcase, and your safety deposit box. If you reuse passwords for more than one computer, account, website, or other secure system, keep in mind that all of those computers, accounts, websites and secure systems will be only as secure as the least secure system on which you have used that password. Don’t enter your password on untrusted systems. One lost key could let a thief unlock all the doors. Remember: Change your passwords on a schedule to keep them fresh. April 20, 2013
Just because your company’s spam filter, virus filter and other defenses let an email through, doesn’t mean it’s harmless Last year, one organization narrowly avoided a virus infestation. Alerts led them to the email in-boxes of the virus authors. To sneak in a virus, hackers used encrypted zip files, which went past filters because they couldn’t be scanned. The organization caught it with the very last line of defense — desktop antivirus software, which triggered after the users had plugged in the password to see the zip file contents! Had the bad guys written something new, instead of using off-the-shelf script kiddie code that was in standard pattern files, there could have been a major outbreak. Long story short: End-user awareness about email and attachments is every bit as important as antivirus filters and firewalls. EVERY USER is an important part of hacker defense! April 19, 2013
Only deal with reputable companies that you know and trust At the very least be sure the company has a physical address and phone number. If you haven’t done business with the company before, visit the Better Business Bureau online (http://www.bbbonline.org) and do some research. Check the company’s website for feedback from previous customers. April 18, 2013
Don’t tell anybody your password This warning includes your systems administrator, who NEVER needs your password. One day I received an e-mail from “Support

View the Original article

Don’t Let Spammers See Your “Out of Office” Replies

Configuring your email program to automatically return “Out of Office” notifications to email senders is good for internal mail system users, but it can provide confirmation of an email address to a spammer, if permitted to leave the corporate network. Configure your message replies to recognize only trusted domain addresses or block your notifications outbound at the firewall.

For home users, never say you are not home, but rather “away from the computer right now”, and don’t specify for how long. You don’t want to advertise your absence. April 21, 2013
Use a password in only one place. Reusing passwords or using the same password all over the place is like carrying one key that unlocks your house, your car, your office, your briefcase, and your safety deposit box. If you reuse passwords for more than one computer, account, website, or other secure system, keep in mind that all of those computers, accounts, websites and secure systems will be only as secure as the least secure system on which you have used that password. Don’t enter your password on untrusted systems. One lost key could let a thief unlock all the doors. Remember: Change your passwords on a schedule to keep them fresh. April 20, 2013
Just because your company’s spam filter, virus filter and other defenses let an email through, doesn’t mean it’s harmless Last year, one organization narrowly avoided a virus infestation. Alerts led them to the email in-boxes of the virus authors. To sneak in a virus, hackers used encrypted zip files, which went past filters because they couldn’t be scanned. The organization caught it with the very last line of defense — desktop antivirus software, which triggered after the users had plugged in the password to see the zip file contents! Had the bad guys written something new, instead of using off-the-shelf script kiddie code that was in standard pattern files, there could have been a major outbreak. Long story short: End-user awareness about email and attachments is every bit as important as antivirus filters and firewalls. EVERY USER is an important part of hacker defense! April 19, 2013
Only deal with reputable companies that you know and trust At the very least be sure the company has a physical address and phone number. If you haven’t done business with the company before, visit the Better Business Bureau online (http://www.bbbonline.org) and do some research. Check the company’s website for feedback from previous customers. April 18, 2013
Don’t tell anybody your password This warning includes your systems administrator, who NEVER needs your password. One day I received an e-mail from “Support

View the Original article

Don’t check “remember my password” boxes

Numerous programs offer the option of “remembering” your password. Unfortunately, many of them have no built-in security measures to protect that information. Some programs actually store the password in clear text in a file on the computer. This means anyone with access to the computer can read the password. It’s best to retype your password each time you log in eliminating the possibility that someone will be able to steal or use it. April 22, 2013
Don’t Let Spammers See Your “Out of Office” Replies Configuring your email program to automatically return “Out of Office” notifications to email senders is good for internal mail system users, but it can provide confirmation of an email address to a spammer, if permitted to leave the corporate network. Configure your message replies to recognize only trusted domain addresses or block your notifications outbound at the firewall.

For home users, never say you are not home, but rather “away from the computer right now”, and don’t specify for how long. You don’t want to advertise your absence. April 21, 2013
Use a password in only one place. Reusing passwords or using the same password all over the place is like carrying one key that unlocks your house, your car, your office, your briefcase, and your safety deposit box. If you reuse passwords for more than one computer, account, website, or other secure system, keep in mind that all of those computers, accounts, websites and secure systems will be only as secure as the least secure system on which you have used that password. Don’t enter your password on untrusted systems. One lost key could let a thief unlock all the doors. Remember: Change your passwords on a schedule to keep them fresh. April 20, 2013
Just because your company’s spam filter, virus filter and other defenses let an email through, doesn’t mean it’s harmless Last year, one organization narrowly avoided a virus infestation. Alerts led them to the email in-boxes of the virus authors. To sneak in a virus, hackers used encrypted zip files, which went past filters because they couldn’t be scanned. The organization caught it with the very last line of defense — desktop antivirus software, which triggered after the users had plugged in the password to see the zip file contents! Had the bad guys written something new, instead of using off-the-shelf script kiddie code that was in standard pattern files, there could have been a major outbreak. Long story short: End-user awareness about email and attachments is every bit as important as antivirus filters and firewalls. EVERY USER is an important part of hacker defense! April 19, 2013
Only deal with reputable companies that you know and trust At the very least be sure the company has a physical address and phone number. If you haven’t done business with the company before, visit the Better Business Bureau online (http://www.bbbonline.org) and do some research. Check the company’s website for feedback from previous customers. April 18, 2013
Don’t tell anybody your password This warning includes your systems administrator, who NEVER needs your password. One day I received an e-mail from “Support

View the Original article

Keep your password secret

Your password is like your bank account PIN – if you give your PIN to someone else, your bank is unlikely to pay you back if it is used to steal from your account. Likewise, your company expects you to use your password to stop others misusing your computer account. If you share your password, you may be held responsible for what other people do with it.

Article about percentage of users that would share their passwords:
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci895483,00.html April 23, 2013
Don’t check “remember my password” boxes Numerous programs offer the option of “remembering” your password. Unfortunately, many of them have no built-in security measures to protect that information. Some programs actually store the password in clear text in a file on the computer. This means anyone with access to the computer can read the password. It’s best to retype your password each time you log in eliminating the possibility that someone will be able to steal or use it. April 22, 2013
Don’t Let Spammers See Your “Out of Office” Replies Configuring your email program to automatically return “Out of Office” notifications to email senders is good for internal mail system users, but it can provide confirmation of an email address to a spammer, if permitted to leave the corporate network. Configure your message replies to recognize only trusted domain addresses or block your notifications outbound at the firewall.

For home users, never say you are not home, but rather “away from the computer right now”, and don’t specify for how long. You don’t want to advertise your absence. April 21, 2013
Use a password in only one place. Reusing passwords or using the same password all over the place is like carrying one key that unlocks your house, your car, your office, your briefcase, and your safety deposit box. If you reuse passwords for more than one computer, account, website, or other secure system, keep in mind that all of those computers, accounts, websites and secure systems will be only as secure as the least secure system on which you have used that password. Don’t enter your password on untrusted systems. One lost key could let a thief unlock all the doors. Remember: Change your passwords on a schedule to keep them fresh. April 20, 2013
Just because your company’s spam filter, virus filter and other defenses let an email through, doesn’t mean it’s harmless Last year, one organization narrowly avoided a virus infestation. Alerts led them to the email in-boxes of the virus authors. To sneak in a virus, hackers used encrypted zip files, which went past filters because they couldn’t be scanned. The organization caught it with the very last line of defense — desktop antivirus software, which triggered after the users had plugged in the password to see the zip file contents! Had the bad guys written something new, instead of using off-the-shelf script kiddie code that was in standard pattern files, there could have been a major outbreak. Long story short: End-user awareness about email and attachments is every bit as important as antivirus filters and firewalls. EVERY USER is an important part of hacker defense! April 19, 2013
Only deal with reputable companies that you know and trust At the very least be sure the company has a physical address and phone number. If you haven’t done business with the company before, visit the Better Business Bureau online (http://www.bbbonline.org) and do some research. Check the company’s website for feedback from previous customers. April 18, 2013
Don’t tell anybody your password This warning includes your systems administrator, who NEVER needs your password. One day I received an e-mail from “Support

View the Original article

Check for encryption or secure sites when providing confidential information online

Credit card and online banking sites are convenient and easy ways to purchase and handle financial transactions. They are also the most frequently spoofed or “faked” sites for phishing scams. Information you provide to online banking and shopping sites should be encrypted and the site’s URL should begin with https. Some browsers have an icon representing a lock at the lower right of the browser window. For more information about phishing, please visit http://www.onguardonline.gov/phishing.html April 25, 2013
Avoid spam in your IM email account Did you ever sign up with an Instant Messenger client so that you could chat with your buddies? Perhaps you have more than one running on the desktop. Each popular IM client comes conveniently with an Email account, and each time there is an email associated with your IM screen name, you receive a notice with this account filling up. You can prevent the spam or any email notices from appearing by using a single filter. Since I added the following filter on my email account attached to my Yahoo IM, I no longer get these notifications. Simply add a filter that the From/ Address includes

View the Original article

Don’t be duped by Internet Fraud

We all get offers that seem too good to be true. Whether they come by email or appear on web sites, they are often clever schemes designed to dupe the gullible. Don’t be tricked by Internet Fraud. For more information see http://www.lookstoogoodtobetrue.com. April 26, 2013
Check for encryption or secure sites when providing confidential information online Credit card and online banking sites are convenient and easy ways to purchase and handle financial transactions. They are also the most frequently spoofed or “faked” sites for phishing scams. Information you provide to online banking and shopping sites should be encrypted and the site’s URL should begin with https. Some browsers have an icon representing a lock at the lower right of the browser window. For more information about phishing, please visit http://www.onguardonline.gov/phishing.html April 25, 2013
Avoid spam in your IM email account Did you ever sign up with an Instant Messenger client so that you could chat with your buddies? Perhaps you have more than one running on the desktop. Each popular IM client comes conveniently with an Email account, and each time there is an email associated with your IM screen name, you receive a notice with this account filling up. You can prevent the spam or any email notices from appearing by using a single filter. Since I added the following filter on my email account attached to my Yahoo IM, I no longer get these notifications. Simply add a filter that the From/ Address includes

View the Original article

Do NOT open unknown or unexpected e-mail attachments

This morning I got an e-mail from my boss with an attachment. My boss is a man of few words on e-mail. If he wants to explain or discuss something with me, he picks up the phone. When he wants me to read or edit something we have talked about, he sends it to me. Even though the subject line was a date, the e-mail had no text, AND my boss hadn’t told me he was sending me an attachment, I opened it because it was from my boss at an e-mail address I recognized. Bad move. Imagine my surprise when my Norton anti-virus screen popped up with a message that the attachment contained a virus and had been deleted. Hackers had spoofed his address and I had fallen for it. April 27, 2013
Don’t be duped by Internet Fraud We all get offers that seem too good to be true. Whether they come by email or appear on web sites, they are often clever schemes designed to dupe the gullible. Don’t be tricked by Internet Fraud. For more information see http://www.lookstoogoodtobetrue.com. April 26, 2013
Check for encryption or secure sites when providing confidential information online Credit card and online banking sites are convenient and easy ways to purchase and handle financial transactions. They are also the most frequently spoofed or “faked” sites for phishing scams. Information you provide to online banking and shopping sites should be encrypted and the site’s URL should begin with https. Some browsers have an icon representing a lock at the lower right of the browser window. For more information about phishing, please visit http://www.onguardonline.gov/phishing.html April 25, 2013
Avoid spam in your IM email account Did you ever sign up with an Instant Messenger client so that you could chat with your buddies? Perhaps you have more than one running on the desktop. Each popular IM client comes conveniently with an Email account, and each time there is an email associated with your IM screen name, you receive a notice with this account filling up. You can prevent the spam or any email notices from appearing by using a single filter. Since I added the following filter on my email account attached to my Yahoo IM, I no longer get these notifications. Simply add a filter that the From/ Address includes

View the Original article