IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

Disposing Old Computers

27 March 2012 By Teresa Martinez

IT security is not only about protecting the equipments and devices that are presently used but is also about the proper disposal of old equipments and devices.  This is especially important in old computers since we might just be allowing threats to enter our lives.  Hackers are known to be able to penetrate the hard drives of discarded computers to fish out sensitive, personal information. 

To prevent this from happening, it is necessary for computer owners to make sure that no such information or any information can be retrieved in the manner.  The best way is to destroy the hard drive physically through the use of a heavy hammer.   It goes without saying that the hard drive should be removed first from the computer.  This can be done with the proper tools or through the assistance of a computer technician. 

The rest of the computer parts can be sent to a recycling center so that reusable components can be collected to build refurbished ones.  The remaining unusable parts find their way to smelting centers where they can be recycled.  This is one way of helping protect our environment.

There is no telling how personal information retrieved from old computers will be used by criminal elements.  Hackers will be especially looking for information that can allow them to steal the identity of owners such as social security numbers, credit card numbers, and bank account numbers.  Information of this nature in the hands of criminals can wreck havoc on a person’s personal and financial life.   

People often forget that equipments and devices are capable of storing data indefinitely even when they have performed certain tasks to erase them.  Reformatting the hard drive was previously believed to be enough for the purpose but experience show that it is not.  It always makes sense to be one step ahead of criminal minds.

Filed Under: IT Security Basics, Physical Security Tagged With: destroying old computers, proper disposal of old computers

Securing Data in Travel

18 February 2012 By Teresa Martinez

Loss of physical property is not the only concern when a phone, laptop, or netbook goes missing while traveling.  More than the cost of the equipment itself, there is the potential exposure of personal data contained in them that could represent undetermined costs to its owners.  Costs will not be limited to the financial aspect but will include concerns regarding business/trade secrets, security of self and family members, and exposure of other sensitive data that can affect reputation and well-being.

When it is absolutely necessary to bring equipments or files along in travel, travelers will have to anticipate possible scenarios that may occur unexpectedly.  Things do not always go as planned in spite of best precautionary measures taken.  Travelers will have to try to minimize the potential damage by the performance of certain actions such as scrubbing laptops of important files or at the very least encrypting these files when it is necessary to bring them, and opting to bring the less expensive laptop  which could also perform the required functions in travel.  They can opt to bring the next best alternative which when lost is easier accepted.

Securing data requires travelers to remove all those data that are deemed NOT for public consumption from laptops and other mobile devices.  Personal information in the hands of unscrupulous people is like a time bomb waiting to explode on the faces of its owners.  Bank and credit card details should not be conveniently found in the stolen item since this could equate to a major financial debacle.  The scenario becomes even scarier when victimized in a foreign country where travelers have no family or friends to turn to.

Online activity should always be done discreetly.  Travelers should not call attention to themselves when using expensive laptops and other like equipments.  It is always best practice not to check the laptop along with other luggage and have it close while on the plane to avoid the possibility of forgetting about it and leaving it behind.

Filed Under: IT Security Basics, Physical Security Tagged With: data security in travel, lost laptop

Good Old-Fashioned Protection

4 January 2012 By Teresa Martinez

Sometimes, we fail to see the solution because our eyes are too far off from the obvious.  A case in point is the protection of our computer and its system from the physical threats that are present in the environment.  Before we even think of the the intricate digital barrier we should use to prevent malware and viruses that pervade the online world from entering our system, we should be considering the measures we can use to protect our devices which contain critical information, whether personal or business.

Good old-fashioned protection is not merely placing the computer and other devices under lock and key.  It is also about considering who has access to these locks.  A high-security risk environment will exactly be such in terms of possible theft  or intrusion.  It is likewise about protection from the natural elements like water and heat and occurences like power surges and fluctuations. 

Visitors are best received away from the regular work area.  This prevents potential information thieves from being able to read computer screens, install malware on network devices, or simply being within reach of portable devices that can be stolen without being noticed.  Desktop computers that come in individual cases can be locked to prevent tampering of  internal hardware. 

Physical protection would also entail other sensible and simple acts such as locking the personal account whenever the user needs to step away from the computer and installing security cameras in areas of specific security concern.  Not many people are aware that  the manner of placement of network cables and equipments can result to a tendency for accidental loss of information. Another important aspect of physical protection is securing the access point for those using wireless networks.  Threats can come in all forms but the simplest defense is usually the most important.

Filed Under: Physical Security Tagged With: physical protection, Physical Security

How to Open an Online Checking Account

15 September 2011 By dave

Checking accounts are very handy. With it you can pay your bills, pay for your purchases and keep track of your spending bills. Online checking accounts work the same way, except that they are more convenient to use. You can online fund transfer, unlimited ATM access and easy application procedures. Like with traditional banks, most of these are insured by the FDIC, which means that your money is safe and secured. Now here’s how to open online checking accounts.


Step 1 – Search online for online banks

When doing this, you need to consider the bank’s reputation, their accessibility, their security features, they accreditation and of how much fees they charge for the online application. Most of these banks do not charge you for anything but there are others that do.

Step 2 – Fill their online application

After deciding which online bank to enroll you into, it is now time to fill out the bank’s online application form. This may include your social security number, email address, physical address and name and birth date. After filling out the application form, they will give you some log in access including your password. They would usually ask you to change your password immediately and log back on to your account.

Step 3 – Read the terms and conditions
After signing up, it is important that you read the bank’s terms and conditions very carefully. Most of the times, the term contract are written in very small font so that customers will refuse to read them. But this is where you will find out about the hidden fees and other concerns that might cause complications in the future.

Filed Under: General, IT Security Basics, Physical Security Tagged With: Banking, checking accounts

Telecommuting Woes???

27 July 2011 By Saran

telecommute.jpgResearch has shown that a survey conducted within a large company shows that although telecommuting is very much productive for many firms it tends to be on the downside for those employees who do stay within the physical office itself. This can be in the areas of personal assistants/secretaries and other office workers who are left to run the office in the absence of their counterparts/coworkers. This leads to dissatisfaction in the workplace hence lowering productivity and encouraging home-bodies to engage in dangerous liaisons from within and outside of the office.

The hatred felt is seen in the rising occurrences of these same people becoming the entry point for attacks on corporate networks when they visit social sites to pass on the otherwise boring day. This is also counterproductive for their attention to work and the other nuances such as physical security and IT security is so much a threat that it is under study on how to improve the working conditions for these people. They are distracted and left to do almost anything they please which is where the security gap seems to be, using the corporate network to access social sites to which they are members of. Even the installation of hardware and software security measures cannot guarantee security coverage at all angles for the main security risk is still the human behind the keyboard who does the typing and not on the structure of the system itself. It might be helpful to get them out more often to allow their facilities more practice letting the steam and pressures/boredom to dissipate. Role rotation may be a key but is not always feasible for there are certain knowledge associated issues that have to be addressed to be able to do that. Training and re-training people allows them to sharpen skills and add new knowledge to their already bored lives.

Filed Under: General, Instant Messaging, IT Security Basics, Malware, Network Security, Physical Security, Privacy & Anonymity, Real-World Issues, Security Policies Tagged With: Mobile-Workforce, Telecommuting

Complacency – the IY industry’s Worst Enemy

20 July 2011 By Saran

complacency.jpgThis has been proven true by incidents broadcast around the world in minutes or hours after they have happened. Many have suffered the consequences of such incidents in the UK, US and mostly each and every place on earth where people have had their information taken and used for no good before there was even a sign that there was a problem.

Big business has been reminded again and again that complacency is it’s worst enemy and they have failed again and again at the area. Why? Well first, total protection is almost always imperfect and somebody out there with enough intent and resources can break-in however expensive the protection methods may be. Next is that the best systems for protection is always the ones that cost too much yet they still remain vulnerable and hackable. Contrary to most ad’s you see in print, the internet or your Television there is no one true solution to protection, for if the hardware and software measures succeed in protecting you, the human behind the computer/s are always the biggest risk. That is why even the most expensive solutions are used in conjunction with other solutions to provide the best of both worlds combining physical and software solutions hoping that combination will be enough protection from the continuous influx of attacks from the web and elsewhere. Encryption is nice but it takes a lot of computing power to implement making it too expensive for implementation on all levels of the company. All of these high-tech solutions and hardware would be nothing if the people using the various computer systems in the said organization fail to use them so the weakest link in every system is still the human. Strict adherence and compliance is the key with systems that process information somewhat autonomously already in use doing the searching and classification of information without the user’s input. This uses the latest in Artificial Intelligence with minimal intervention or input from the users.

Filed Under: Cryptography, General, IT Security Basics, Network Security, Physical Security, Privacy & Anonymity, Real-World Issues, Security Policies Tagged With: IT Security Basics

Older Posts

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security