Easy ways to protect your privacy and data
Posted on 11 January 2012.
In spite of one high profile computer security breach after another, many people are still not employing even the most basic safeguards to protect their privacy and their data. Defence Intelligence has created the following seven computer security resolutions to help people protect their privacy, their data, and their wallets.

Stay up to date
  • Keep everything updated. Your operating system, your web browser, anti-virus, Acrobat, Java, everything.
  • Set programs to automatically update so itís not as annoying.
  • Before randomly clicking the ďupdateĒ button, be sure you recognize the program and it looks legitimate. If in doubt about an update pop up, open the program itself and update from there.
Improve your passwords
  • Stop using the same password in multiple places. Unless itís a throwaway account that you care nothing about, have a unique password for everything you do.
  • Strengthen your passwords by adding numbers, symbols and capital letters. Try using phrases instead of a single word.
  • Do not store your passwords in your browser.
Check your messages
  • If you donít know who the email is from, donít open it.
  • Turn off the preview feature in your email program. Some malware can be executed simply by being opened in the preview pane.
  • Donít click on links in received emails. These can be faked and may lead you to bad places. Copy the address and then paste it in your browser instead.
  • Donít open any attachments that you arenít expecting. If itís from a friend, check with them to verify that they sent it.
  • Donít forward forwards.
Know your friends
  • Donít add ďfriendsĒ that you donít know.
  • Keep your friend list up to date. If youíre not sure who the ďfriendsĒ on your contact list are, delete them.
  • Before clicking on any links or files sent to you, verify that your friend intended to send them to you.
Secure your mobile devices
  • Require a password to unlock your phone or tablet and keep it locked when not in use.
  • Donít store anything on your mobile that you arenít comfortable losing.
  • Ensure that your device does not connect automatically to open Wi-Fi networks.
  • Install an application capable of locking down and erasing your device in the event it is lost or stolen.
Watch what you click
  • Be wary of third party applications available for your phone, facebook, etc. If you donít need it, donít install it.
  • Donít click on shortened links on Twitter or elsewhere. You have no idea where you might end up. To see where these links lead to, use a service like http://www.longurl.com or http://www.unfurlr.com.
Share with care
  • Whatever you share online will remain online. Once itís out there, there is no way to remove it.
  • Treat email like a postcard - potentially visible to all.
  • Donít insert random USB keys into your computer - you donít know where theyíve been or what they may contain.


Harnessing artificial intelligence to build an army of virtual analysts

PatternEx, a startup that gathered a team of AI researcher from MIT CSAIL as well as security and distributed systems experts, is poised to shake up things in the user and entity behavior analytics market.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Tue, Feb 9th