Wednesday, November 26, 2014

Security manuals for all tastes

Nowadays written manuals are something usual, but its history began just two centuries ago, when the evolution of scientific doctrine influenced the democratization of epistolary genre (letters) as a tool for indoctrination.


Thanks to the Internet, the concept of manual has blurred, since it can come out  on different formats now. Ranging from video-tutorials to infographics or articles on both social networks and blogs. This post is an example of it. You may want to keep it on your bookmarks, as it collects several of these manuals to learn and to master new technologies in a secure way. Let's start.

Scam campaigns on social media are the order of the day, as you can see regarding a Starbucks’ fraudulent account on Instagram that announced a supposed promotion via direct messages with a malicious link. Distrust all those accounts which do not have Twitter’s verification.

If you want to protecty our communications, use encryption. INCIBE explains one of the most important elements that interferes with the chain of information securitization: entropy. The value of entropy will be higher or lower depending on the ability of the device and software to create random mathematical elements, which will be responsible for encrypting data.

We are barely aware of all this new wave of technology that is slowly settling in vital sectors such as banking or our own homes. So let’s have a look to what the future (present) has for us: remote monitoring both for personal and business security, virtual currencies, online payments, personal details... along with all their risks.

This is why you need to know how to protect your home. If you install a video surveillance system, for example, you must set it up properly. To fortify your both physical and digital defenses is as important as to lift them. WIFIs and cameras with default settings, outdated systems, disused connected devices... All these open digital windows to cybercriminals.

In relation with passive and active perimeter security, today browsers are a gateway to most our communications on the network. It is therefore necessary to make sure that they are well set up. Otherwise think about whether you should install some plug-ins to protect your privacy and personal data.

After all if you do not take measures, someone else will. Even it is risky to connect to your neighbour’s WIFI, whether he is a security expert (for obvious reasons) as if he is completely unaware of these issues (since then he may already be a victim of some malware that could infect your devices). And this can be applied to both neighbor’s and public WIFIs, where hundreds (perhaps thousands) of people are continuously connected.

There are all type of manuals for all levels, all of them with the same purpose: to raise awareness of the importance of maintaining secure communications in the digital world, and the consequences of the lack of it.

0 comments:

Post a Comment