  {"id":1296,"date":"2015-10-15T11:47:27","date_gmt":"2015-10-15T15:47:27","guid":{"rendered":"https:\/\/www.saintpeters.edu\/its\/?page_id=1296"},"modified":"2016-02-12T16:21:57","modified_gmt":"2016-02-12T21:21:57","slug":"online-safety","status":"publish","type":"page","link":"https:\/\/www.saintpeters.edu\/its\/resources\/online-safety\/","title":{"rendered":"Cyber Security: Don&#8217;t Go It Alone"},"content":{"rendered":"<h3>1. Know your enemy, know yourself.<\/h3>\n<p>Anyone can use the internet \u2013 it\u2019s very different from, say, driving a car, which requires authorization from a governing body, familiarity with the rules of the road, and standard automotive safety procedures. A lot of security issues occur because of general lack of knowledge. We hope you use this guide wisely, to protect yourself, your data, and make the internet a safer place for everyone.<\/p>\n<p>It\u2019s a dangerous world out there. The virtual world holds information about everyone and everything it seems, and where there\u2019s information, there\u2019s people attempting to profit from it, by any means necessary.<\/p>\n<p>You may think \u201cWhy would I be a target? How is my information worth so much?\u201d Consider this \u2013 in addition to bank account and financial information, every aspect of what you do online could be considered valuable. For example, if you attend a university and you have a digital transcript, with your name, password, email address, contact information, school information, subjects, and grades &#8211; that information would be valuable to marketing companies to add you to mailing lists without your consent. Identity thieves could use your information to spoof their way into financial transactions using your credentials and negatively affect your credit.<\/p>\n<p>If you are a college student, don\u2019t have much credit history, or are a parent, you should be especially aware of cyber security. The most valuable information hackers can get is PII (Personally Identifiable Information) from someone who has no or very little credit history, since there\u2019s little data that would bring up red flags to lenders or creditors.<\/p>\n<p>If you\u2019re using a computer or smartphone that has malware, a keylogger might be recording your keystrokes and web sites, sending that information back to hackers. If you have a Trojan virus, hackers could be accessing your files directly or launching programs on your computer directing it to spam others. If you open a phishing email, a virus could download that re-sends out that malicious email to everyone on your contacts list.<\/p>\n<p>Lists of passwords and IDs can be bought and sold on the black market, and you may not ever find out about this until you want to buy a house, or take out a loan, and the bank turns you down. When you use a credit or debit card to purchase goods and services, companies keep a digital record of your purchase, and if their security has been compromised, that information may be available to anyone who wants to buy it.<\/p>\n<p>So, should you start storing money under the mattress, shut down the computer permanently, and withdraw from society? Of course not \u00a0\u2013 but you should take active steps to make sure you are aware of what information you\u2019re giving out, where, be aware of signs that you may have been compromised, and have a plan on what to do if you are compromised.<\/p>\n<h3>2. Mind your PII!<\/h3>\n<p><strong>Personally identifiable information (PII)<\/strong> is any data that could potentially identify a specific individual. Any information that can be used to distinguish one person from another and can be used for de-anonymizing anonymous data can be considered PII. This includes your name, address, date of birth, social security number, user ID, password, or even information about your family or life. Basically, this information is what\u2019s most valuable to criminals, because it sets you apart from everyone else in the world.<\/p>\n<p>Don\u2019t give out PII to just anyone who asks \u2013 you will need to make a determination if it is for a legitimate or malicious purpose. For example, when you want to take money out of an ATM, you put in your credit card, and you are asked for your PIN number \u2013 that PIN number is PII, and it is being given for a legitimate purpose. If you call a doctor\u2019s office to make an appointment and they ask for your date of birth and address \u2013 that\u2019s a legitimate reason to give PII. If you receive a call from a company and they ask for your full social security number \u2013 that is NOT a legitimate purpose to give PII \u2013 treat this and similar situations with caution.<\/p>\n<p><strong>Valuable PII would be:<\/strong><\/p>\n<ul>\n<li>Social security number<\/li>\n<li>Driver\u2019s license\/state ID number<\/li>\n<li>Date of Birth<\/li>\n<li>Full name<\/li>\n<li>Home address<\/li>\n<li>Home phone number<\/li>\n<li>School ID number<\/li>\n<li>Specific medical or financial information, such as bank account\/credit card information<\/li>\n<\/ul>\n<p>If you are asked to give PII, ask yourself first \u201ccan I trust the other person with this information?\u201d and \u201cwill this information be kept secure?\u201d This doesn\u2019t just apply to in-person exchanges, but also includes information expressed over the telephone, or anything you type in an email or type in online. Make sure to mind your PII!<\/p>\n<h3>3. Hold that\u00a0USB!<\/h3>\n<p>Just like in the real world, where coughing on another person could give them a nasty head cold, computer viruses and other malware can be passed on by physical contact. This doesn\u2019t mean touching your screen to an infected iPad will give it a Trojan though \u2013 this type of exchange can occur when you plug in an infected USB, CD, Smartphone, or other media device to your machine.<\/p>\n<p>While read-only Optical media like CDs and DVDs usually have verified contents on them, read\/write devices such as USB plugs (and the devices that can plug into them) may act as an unintentional spreading ground for malware. There\u2019s a lot of malware today that scans for input devices, and when they are detected, copies itself to the device \u2013 and then when that device is plugged into another machine, infects the new machine. Even completely new USB storage devices have been found to occasionally have malware loaded into them.<\/p>\n<p>So, if you have a virus on your phone, don\u2019t plug it into your computer to charge (and vice versa) \u2013 even if the virus is not compatible with that device\u2019s operating system, it\u2019s still there, and can be transferred to other devices that use it.<\/p>\n<p>The best practice is to make sure to include media devices when you\u2019re running virus and malware scans, and to make sure they\u2019re clean before using them.<\/p>\n<h3>4. Be smart about smartphones!<\/h3>\n<p>Years ago, cell phones couldn\u2019t really do much besides make calls or send texts. Now, almost everyone has a smartphone, and while technology is rapidly increasing the amount of new features they can use, and people are adding more and more data to their mobile devices, hackers are developing more sophisticated malware targeting Smartphone operating systems.<\/p>\n<p>If you get emails or use the internet with your smartphone, be mindful to use the same level of security as if you were on a computer \u2013 don\u2019t open suspicious links or download suspicious applications. Smartphone apps can be Trojans or contain malware as well \u2013 make sure when you download an app it is verified and trusted by a recognized publisher \u2013 make sure you check out the ratings and reviews. If you see a popular app you want to get that has low ratings or is free (but should be for pay) \u2013 avoid it!<\/p>\n<p>On your smartphone, also be aware of the networks you\u2019re connecting to and your connection settings. Make sure you only connect to secure, encrypted networks, and be wary of connecting to public Wi-Fi. A lot of smartphones and mobile devices have a setting that allows the phone to act as a modem \u2013 make sure if you have this setting, it is only enabled to accept devices that you allow, and set a password.<\/p>\n<h3>5. The high-wireless act<\/h3>\n<p>Getting internet no longer requires you to plug into a wall \u2013 you have the power of freedom. But with great power comes great responsibility. Wireless networks are a prime target for hackers, especially in urban areas which encounter a lot of foot traffic. If you are broadcasting a wireless signal from your home router or mobile device, make sure that it\u2019s encrypted, and use a strong password. If you are attempting to connect to a wireless network, make sure you connect to a secure network as well \u2013 hackers can and will set up networks and steal data from your wireless devices when you connect.<\/p>\n<p>In addition to stealing information from you, having an unsecured network could lead to data leeching, which may also be used for malicious purposes. If you are running an unsecured wireless network in your house, someone with malicious intentions could connect to your network, and download illegal software or conduct criminal activities \u2013 and when authorities trace the activities back to the source, it\u2019ll appear as if it came from you, since they were on your network!<\/p>\n<h3>6. Social media \u2013 friend or foe?<\/h3>\n<p>Social media and chat networks are awesome. You can friend people that you forgot about years ago, find old classmates, and make new friends across the globe. However, amidst all the pictures, sharing stories, and posts about cats, if you don\u2019t protect your PII, there\u2019s a danger lurking. A popular technique used by hackers is to set up spoofed accounts of people on social networks such as Facebook, Skype and Linkedin, and attempting to friend you or have you \u201cadd\u201d them. Once you do this, you\u2019re giving them access to all the PII you\u2019ve created on that social network \u2013 names, photos, family information, and more.<\/p>\n<p>Be careful about who you friend \u2013 they may become your worst enemy!<\/p>\n<h3>7. Monitor your monitor<\/h3>\n<p>While there\u2019s a lot of malicious software out there, there\u2019s also a lot of valuable tools and resources to refer to and use for your own security purposes. Many internet browsers now are designed to automatically update on new releases, and patches for security loopholes are often documented and resolved.<\/p>\n<p>Even the most secure websites can be compromised and are, every day. Make sure you go out there with the proper equipment.<\/p>\n<ul>\n<li>Use up-to-date versions of your browser \u2013 if it prompts you to install the update, install it (after ensuring it is from the verified publisher).<\/li>\n<li>On windows Vista or later Windows operating systems, you will receive alerts of a program attempts to change settings on your computer. Pay attention to this, and make sure to authorize only changes you know about.<\/li>\n<li>Make sure you have an antivirus installed that also has anti-malware: there are many antivirus companies that provide excellent service. Some are free (but have paid features), and some are subscription based. There are several free antivirus and anti-malware programs which are very highly rated \u2013 including Panda, Bitdefender, MalwareBytes, Ad-Aware, Avast, and AVG have free versions just to name a few. With a paid or subscription upgrade, your protective software can provide you better passive protection, active protection when you are browsing, and most offer some level of immediate customer support and resolution handling. Kaspersky, Macafee and Norton are some of the big names in paid virus protection. Having a computer without an antivirus program is like having a house without a lock!<\/li>\n<li>Wait for a web page to load before clicking around. Sometimes, slow-loading web pages have hidden data and popups that are activated by clicking in certain areas.<\/li>\n<li>Look before you click \u2013 some web pages that have beneficial content have ads that look like download buttons or links to the software you want. Make sure to read everything carefully before clicking!<\/li>\n<li>Avoid opening suspicious emails \u2013 if you see an email that is not from someone you know, or looks sort of\/kind of like it came from a company or bank, and it\u2019s asking you to follow a link or download a file, treat this with caution, as it may be a phishing attempt. For the record, most banks and government agencies do NOT ask for PII via email \u2013 so if you see this, be alert.<\/li>\n<li>Watch out for email scams as well \u2013 emails promising you money or favors in exchange of sharing a bank account or providing a small initial deposit. Don\u2019t reply, and make sure they are flagged as junk mail or spam to your internet provider!<\/li>\n<li>If you are on a shopping website where you are asked to provide credit card or banking information, or a website that requires you to submit PII such as your social security number, make sure the site is using SSL (Secure socket layer), make sure the website is using Secure HTTP (HTTPS) and check the site\u2019s certificate to make sure it\u2019s secure. You can usually do this by clicking on an area to the left of the URL bar. If there\u2019s an issue with the sites\u2019 certificate or it can\u2019t be authenticated, stay away!<\/li>\n<li>In addition to these practices, you should also make sure to prevent against physical data compromising by:<\/li>\n<li>Putting a password on your computer, so that only you (or another authorized user) can access it<\/li>\n<li>If you have administrative access to your computer, do not use the administrative login unless you absolutely need to \u2013 use a regular, user-level login instead. This ensures that if your account is somehow compromised, the malware will not be able to affect administrative settings of your computer.<\/li>\n<li>Lock your screen when not using it \u2013 not with a physical lock of course, but by enabling the setting that prevents someone from accessing it while you\u2019re away. Windows 8 and later operating systems, and many handled devices offer \u201ctouch-passwords\u201d or \u201cpicture passwords\u201d which require you to set up your password as a gesture or set of pictures rather than a letter\/number password. This provides much greater security.<\/li>\n<li>Don\u2019t leave your mobile device unattended or alone in a car! Thieves will break into cars just to steal phones \u2013 treat your phone, laptop or tablet as if it were a wallet or purse \u2013 don\u2019t let it sit out in plain sight.<\/li>\n<\/ul>\n<h3>8. Uh-oh&#8230;what do I do now?<\/h3>\n<p>So you think you have malware on your machine. Maybe you clicked a phishing link by mistake, or went to a new website that had strange popups, and now your computer is slow, programs are crashing, odd new software is appearing, or you can\u2019t connect to the internet anymore. Don\u2019t worry, happens to the best of us. There\u2019s a few important things you need to do:<\/p>\n<ol>\n<li><strong>DO<\/strong> take a deep breath, calm down, and don\u2019t panic. Stress causes irrational actions, and you could end up doing something that causes further damage.<\/li>\n<li><strong>DO NOT<\/strong> turn the computer off \/attempt to restart it. A large portion of malware is designed so that the user thinks it\u2019s a \u201cnormal computer error\u201d that can be fixed when the system restarts \u2013 when in fact, restarting triggers the malware&#8217;s code to edit settings that can only be modified during this time, like the registry \u2013 further throttling your computer\u2019s performance.<\/li>\n<li><strong>DO NOT<\/strong> run unnecessary programs \u2013 if you think you\u2019re on a compromised computer, don\u2019t use it to log into your bank and check your balance, or try to change your passwords yet, there\u2019s a good chance that information will be recorded.<\/li>\n<li><strong>DO<\/strong> Contact your ITS department right away (give them a call) and tell them the situation. If they ask for information about your computer, what programs you are using, and what websites you went to, let them know! They are professional and will do what they can to both mitigate the system, and restore your computer to working order.<\/li>\n<\/ol>\n<h3>9. Common terms and their explanations:<\/h3>\n<p><strong>&#8216;Malware&#8217;<\/strong> is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software.<\/p>\n<p><strong>Phishing<\/strong> is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. A phishing attempt could be an email that appears to be coming from a reputable source (say, a cousin, or a teacher, or a company) that has a link or attachment in it that usually discreetly downloads a virus or a keylogger into your system. Phishing emails usually have an \u201curgent\u201d tone, stating that you need to open the attachment or follow the link immediately, and more often than not, contain grammatical miscues. Phishing can also come via phone, by people pretending to be from the government, a company, or IT \u2013 if you get a call that asks you for PII, make sure you can trust the caller. If you are unsure if you are being Phished, make sure you contact IT services right away!<\/p>\n<p>A <strong>Trojan horse<\/strong>, or <strong>Trojan<\/strong>, in computing is any malicious computer program which misrepresents itself as useful, routine, or interesting in order to persuade a victim to install it. These could be installed on your machine by other malware or compromised websites. A lot of Trojans attempt to pass themselves off as games, or security software, and while they slow your computer down, prompt you to run the \u201csecurity\u201d software, which leads to further damage. \u00a0Trojans usually do one (or more) of the following:<\/p>\n<ul>\n<li>Install malware on your computer<\/li>\n<li>Open a \u201cbackdoor\u201d \u2013 basically letting other compromised machines connect and access your computer\u2019s data<\/li>\n<li>Slow down your computer or crash files\/programs<\/li>\n<li>To avoid Trojans, make sure you have an updated and active antivirus program; don\u2019t click on Phishing links; avoid websites that have been compromised, and make sure you have the latest antivirus security installed on your machine.<\/li>\n<\/ul>\n<p><strong>Adware<\/strong>, or advertising-supported software, is any software package that automatically renders advertisements in order to generate revenue for its author. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process. While adware is not necessarily malicious, it is intrusive and can be used to collect data and PII if you are not careful. This can generally be found in \u201cfree\u201d* software downloads.<\/p>\n<p><em>*remember, nothing is ever truly free \u2013 there\u2019s always a price to be paid!<\/em><\/p>\n<p><strong>Keystroke logging<\/strong>, often referred to as <strong>keylogging<\/strong> or <strong>keyboard capturing<\/strong>, is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. While there are several legal uses for keyloggers, their malicious use is prevalent and can capture your passwords and entered information on web forms.<\/p>\n<p>A <strong>computer virus<\/strong> is a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Malware\" target=\"_blank\">malware<\/a> <a href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_program\" target=\"_blank\">program<\/a> that, when executed, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Self-replicating_program\" target=\"_blank\">replicates<\/a> by inserting copies of itself (possibly modified) into other <a href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_programs\" target=\"_blank\">computer programs<\/a>, data <a href=\"https:\/\/en.wikipedia.org\/wiki\/File_(computing)\" target=\"_blank\">files<\/a>, or the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Boot_sector\" target=\"_blank\">boot sector<\/a> of the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Hard_drive\" target=\"_blank\">hard drive<\/a>; when this replication succeeds, the affected areas are then said to be &#8220;infected&#8221;. Viruses often perform some type of harmful activity on infected hosts, such as stealing <a href=\"https:\/\/en.wikipedia.org\/wiki\/Hard_disk\" target=\"_blank\">hard disk<\/a> space or <a href=\"https:\/\/en.wikipedia.org\/wiki\/Central_processing_unit\" target=\"_blank\">CPU<\/a> time, accessing private information, corrupting data, displaying political or humorous messages on the user&#8217;s screen, spamming their contacts, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Keystroke_logger\" target=\"_blank\">logging their keystrokes<\/a>, or even rendering the computer useless. However, not all viruses carry a destructive payload or attempt to hide themselves\u2014the defining characteristic of viruses is that they are self-replicating computer programs which install themselves without user consent.<\/p>\n<p>A <strong>rootkit<\/strong> is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that would not otherwise be allowed (for example, to an unauthorized user) while at the same time masking its existence or the existence of other software. These are typically very difficult to get rid of, as they consist of multiple components.<\/p>\n<p>A <strong>computer worm<\/strong> is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.<\/p>\n<p><strong>Ransomware<\/strong> is a type of malware that prevents or limits users from accessing their system. This type of malware forces its victims to pay the ransom through certain online payment methods in order to grant access to their systems, or to get their data back. Some ransomware encrypts files (called Cryptolocker).<\/p>\n<p><strong>DDoS<\/strong> is a type of attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack. This slows down or can halt bandwidth completely.<\/p>\n<p>A <strong>Compromised Computer<\/strong> is defined as any computing resource whose confidentiality, integrity or availability has been adversely impacted, either intentionally or unintentionally.<\/p>\n<h3>10. Bank on these tips<\/h3>\n<ul>\n<li>Don\u2019t keep your PIN number, Bank account number, credit card information, or PII such as social security number in your wallet. If you lose it, you may lose more than the money inside!<\/li>\n<li>Know about and Monitor your credit. You can subscribe to Experian or Transunion, which are credit reporting agencies. Another excellent resource is creditkarma.com \u2013 this is free and provides your credit scores and other factors that influence your credit, like late payments, or inquiries.<\/li>\n<li>Make sure your bank has fraud protection on your account, and sign up for monitoring if it\u2019s available \u2013 if you lose your credit card, or your information gets stolen from a company, you will be alerted and can prevent further damage to your credit.<\/li>\n<li>Services which constantly monitor your credit and sensitive information, such as LifeLock, are becoming more popular and are a great tool, in both prevention and reconciliation of a data compromise. They provide compensation in case your data or credit is compromised and offer support in reestablishing credit.<\/li>\n<li>Don\u2019t throw out receipts or leave them laying around ATMs or Banks \u2013 rip them up before throwing them out.<\/li>\n<li>Shred sensitive financial, medical, or other paper information that contains PII before you discard it \u2013 this includes junk mail!<\/li>\n<\/ul>\n<h3>11. Passwords \u2013 Common sense saves cents (and dollars!)<\/h3>\n<ul>\n<li>Use a strong password that contains at LEAST the minimum standards provided on all your devices, wireless connections, and accounts. Make sure this password includes both letters, numbers and special characters; do not use a password that includes other PII, or is easy to guess.<\/li>\n<li>Do not use the same password for multiple accounts; and change your passwords every month. \u00a0This may seem a bit extreme, but it\u2019s the best security practice. Think about it this way \u2013 Your PII is like a house, with all your stuff inside. Billions of \u201cpeople\u201d will pass by your \u201chouse\u201d (and all the other ones out there) every day, most harmlessly on their way somewhere else, but every day, people will try to break into your house by trying to smash the windows, or open the door, or try to get you to let them in. Your door\u2019s lock and key is your password. A \u201cBrute force\u201d attack is when a hacker, in the above example, will stand on your doorstep and take out millions of keys to try them on your door \u2013 eventually, if your password\u2019s not unique and secure enough, one of those keys will work, and they\u2019ll gain access. That\u2019s where having a strong, unique, and changing password will come in handy.<\/li>\n<li>And of course, don\u2019t write down passwords and leave them lying around.<\/li>\n<\/ul>\n<h3>12. Resources<\/h3>\n<p>These resources are great for providing information on cyber-security, offer resources and help, and give a good picture of what to be aware of:<\/p>\n<p><strong>Google\u2019s Digital Attack Map:<\/strong> <a href=\"https:\/\/www.digitalattackmap.com\/\">https:\/\/www.digitalattackmap.com\/<br \/>\n<\/a>A project that <a href=\"https:\/\/www.techworld.com\/news\/security\/demystifying-ddos-attacks-google-ideas-arbor-show-off-new-visualisation-tool-3474646\/\">emerged from Google Ideas <\/a>in 2013, the <a href=\"https:\/\/www.digitalattackmap.com\/\">Digital Attack Map<\/a> is essentially a clever front end placed on global DDoS attack data fed to it by Arbor Networks\u2019 Atlas monitoring nodes on the Internet. Then as now the strength of the concept is that it offers data on DDoS attack trends in real time; a limitation is that significant attacks are often had to spot amidst the flood of other packets.<\/p>\n<p><strong>Bleeping Computer:<\/strong> <a href=\"https:\/\/www.bleepingcomputer.com\/\">https:\/\/www.bleepingcomputer.com\/<br \/>\n<\/a>One of the <a href=\"https:\/\/www.bleepingcomputer.com\/\">best help resources out there <\/a>for ordinary computer users coping with malware infection, particularly recent infection types such as ransomware, screen lockers and aggressive adware. Excellent range of technical \u2018how to\u2019 features and a good place to hear about the latest threats and security gossip before security software firms have mentioned anything. Predominantly Windows but covers all platforms.<\/p>\n<p><strong>US-CERT:<\/strong> <a href=\"https:\/\/www.us-cert.gov\/\">https:\/\/www.us-cert.gov\/<br \/>\n<\/a>After years when nothing changed on the homepage, the site now covers recent vulnerabilities and attacks in modest depth. Offers weekly vulnerability summaries.<\/p>\n<p><strong>Common Vulnerabilities and Exposures (CVE):<\/strong> <a href=\"https:\/\/cve.mitre.org\/\">https:\/\/cve.mitre.org\/<br \/>\n<\/a>The <a href=\"https:\/\/cve.mitre.org\/\">Common Vulnerabilities and Exposures (CVE) database<\/a> is the definitive public software flaw repository (searched through the US National Vulnerability Database), maintained by Mitre Corporation as a system for identifying software flaws. CVEs are the way to find and study the background to any vulnerability and are used across the industry for that purpose. Flaws are also scored for severity using the using the Common Vulnerability Scoring System (CVSS).<\/p>\n<p><strong>Microsoft Malware Protection Center:\u00a0<\/strong><a href=\"https:\/\/www.microsoft.com\/security\/portal\/mmpc\/default.aspx\">https:\/\/www.microsoft.com\/security\/portal\/mmpc\/default.aspx<br \/>\n<\/a>Devoted to Windows (of course) <a href=\"https:\/\/www.microsoft.com\/security\/portal\/mmpc\/default.aspx\">but still an increasingly useful resource<\/a> for troubleshooting a range of security issues. Explains the inner depths of Microsoft\u2019s evolving approach to security better than any of the other public sites and offers a jumping off point to the firm\u2019s full gamut of security-oriented blogs and tools.<\/p>\n<p><strong>Cloud Security Alliance (CSA):\u00a0<\/strong><a href=\"https:\/\/cloudsecurityalliance.org\/\">https:\/\/cloudsecurityalliance.org\/<br \/>\n<\/a>Not a security website in the conventional sense but <a href=\"https:\/\/cloudsecurityalliance.org\/\">the first place to visit<\/a> to understand the considerable complexities of the new and sometimes unfamiliar model of computing. Although partly aimed at its vendor members, there is plenty on this site for anyone looking for technological context and explainers.<\/p>\n<p><strong>Secunia: <\/strong><a href=\"https:\/\/secunia.com\/\">https:\/\/secunia.com\/<br \/>\n<\/a>A commercial firm selling data but Denmark-based <a href=\"https:\/\/secunia.com\/\">Secunia<\/a> offers excellent retrospective reports analysing the top software flaws reported using its free-to-download PSI tool. Also extends the raw data fed into public systems such as CVE.org with useful statistics on the software reporting the most flaws and the most serious zero days. A great sanity check. Secunia was acquired by Flexera Software in September 2015.<\/p>\n<p><strong>Breach Level Index (BLI): <\/strong><a href=\"https:\/\/breachlevelindex.com\/\">https:\/\/breachlevelindex.com\/<br \/>\n<\/a>Now under the auspices of Gemalto (which bought security firm SafeNet in early 2015), <a href=\"https:\/\/breachlevelindex.com\/\">the BLI<\/a> is currently the best public, near real-time database of reported data breach across the world. Allows researchers to search for breaches according to country, sector, breach type, organisations and also applies its own risk score of severity.<\/p>\n<p><strong>SecureMac: <\/strong><a href=\"https:\/\/www.securemac.com\/\">https:\/\/www.securemac.com\/<br \/>\n<\/a>Not that long ago there wouldn\u2019t have been enough to talk about and little user interest. But as a previous Techworld slideshow attests, the Apple world is not firmly in the sight of hackers and criminals. This is now <a href=\"https:\/\/www.securemac.com\/\">essential reading<\/a> for anyone with an Apple deice of any kind who no longer wants to take threats for granted. The list of threats is now surprisingly busy.<\/p>\n<p><strong>SecTools: <\/strong><a href=\"https:\/\/sectools.org\/\">https:\/\/sectools.org\/<br \/>\n<\/a>Notable for its listing of the best free security tools, always a handy <a href=\"https:\/\/sectools.org\/\">point of reference<\/a> when considering paying money for software. Updated often and pretty comprehensive, also lists tools by use as well as popularity and features user reviews \u2013 useful background if you still think TrueCrypt is kosher.<\/p>\n<p><strong>VirusTotal: <\/strong><a href=\"https:\/\/www.virustotal.com\/\">https:\/\/www.virustotal.com\/<br \/>\n<\/a>Encountered an unusual or suspicious file? The <a href=\"https:\/\/www.virustotal.com\/\">VirusTotal industry website<\/a> is the best place to submit it to a clutch of anti-virus engines to see if it checks out or has been marked bad. Crowdsourcing at its best and can also be used against suspicious URLs. Often used a point of reference for the time it takes engines and specific vendors to add malware signatures to their products.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. Know your enemy, know yourself. Anyone can use the internet \u2013 it\u2019s very different from, say, driving a car, which requires authorization from a governing body, familiarity with the rules of the road, and standard automotive safety procedures. A lot of security issues occur because of general lack of knowledge. We hope you use [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":0,"parent":1193,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1296","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.saintpeters.edu\/its\/wp-json\/wp\/v2\/pages\/1296","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.saintpeters.edu\/its\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.saintpeters.edu\/its\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.saintpeters.edu\/its\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.saintpeters.edu\/its\/wp-json\/wp\/v2\/comments?post=1296"}],"version-history":[{"count":3,"href":"https:\/\/www.saintpeters.edu\/its\/wp-json\/wp\/v2\/pages\/1296\/revisions"}],"predecessor-version":[{"id":1368,"href":"https:\/\/www.saintpeters.edu\/its\/wp-json\/wp\/v2\/pages\/1296\/revisions\/1368"}],"up":[{"embeddable":true,"href":"https:\/\/www.saintpeters.edu\/its\/wp-json\/wp\/v2\/pages\/1193"}],"wp:attachment":[{"href":"https:\/\/www.saintpeters.edu\/its\/wp-json\/wp\/v2\/media?parent=1296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}