101 Cybersecurity Tips for My Mom [HQ][Psycho.killer]

Embed Size (px)

Citation preview

  • 8/19/2019 101 Cybersecurity Tips for My Mom [HQ][Psycho.killer]

    1/15

  • 8/19/2019 101 Cybersecurity Tips for My Mom [HQ][Psycho.killer]

    2/15

    101 Cybersecurity Tips for my Mom

    Brian Sanchez

     

    This book as written for my Mom. Really. It actually started as a list of Cybersecurity

    checks for her because one day we found out that someone was using her network connection. Knowing that I worked with computers, she called me one day and askedme why her cable internet was slow. At the time she had only a few devices and most

    ere not even used. After a few questions I found that her roommate’s daughter hadsetup their new router. I was skeptical of the settings and wanted to take a look. Igained access to her machine and after a few moments I discovered that there weremore than 7 other devices logged into her network.

    I found that not only was her Wi-Fi set to a low security setting but also that theadministrator password on the router was not setup. Mom gasped as I was rootedaround in her router and showed her the empty password fields. I then showed her thatthere were other unknown devices logged into the router sharing her network. She saidshe felt sick to her stomach knowing her neighbors were using her internet connection.I made her painfully aware of the legal ramifications and possible consequences if someone were to download something illegal on her network. She then asked me whatelse she had missed. I felt horrible for her and fixed her router on the spot. I thenthough that she needed a list of other things to check and perhaps a guide of how tolive her “life” when it came to the internet. And thus, this list was born and now I’dlike to share it with you.

    The digital world we live in is vast and touches every aspect of our lives. Think abouthow much money and private information that is moved across a network. It makes a

     perfect place for thieves and hackers to apply their knowledge anonymously. Don’tthink for a moment that you are immune or just because you don’t have a milliondollars you still have value. That value can be your e-mail contact list that trusts you,your SSN or even simply your computer or internet connection.

    This book is designed to bring your attention to the most critical points of Cybersecurity that affect you and your machines. Remember this is a list of key pointsthat you need to be aware of. I won’t waste your time by explaining how to make all of these changes only just that you need to make them. There are tons of resources onlineto walk you through making them step by step. It’s is important that you learn the

     basics. For example, when it comes to configuring your home router and locking downyour Wi-Fi it’s crucial that you understand how and why. You are responsible for anything that transmits across that network and ignorance is no excuse in the eye of thelaw. Is it really fair that you can be held responsible for your neighbor’s hacks into

  • 8/19/2019 101 Cybersecurity Tips for My Mom [HQ][Psycho.killer]

    3/15

    your Wi-Fi and downloads illegal files?

    I encourage you to Google the keywords in these bullet points and learn more. Or,even easier, use Youtube and then search. You may be shocked. Don’t think it can’thappen to you it can and probably already is. If you want to hear some horror storiesfind my blogs!

    The world of computers moves fast so I will make it a goal to update the version of this book every 3 months. This book is current as of 4JUL15. If the point warrantsfurther explanation, run a search in YouTube.

    Personal Computers, laptops and desktops

    I’d like to start at the foundation of our home or small business network. This is theuser endpoint and where the largest interaction takes place. Each of these bullet pointsrelate to every PC on the network and in some cases, every account.

    -Use a password to log into your PC and do not share your account. You can make aguest account for other users with their own password.

    -Do not allow your main account to be the administrator account. Create a standarduser account for daily use and an Administrator account when you have to install or make a change. If your standard everyday account has administrator privilegesanything you run had administrative privileges including a virus or malware.

    -If you walk away from your PC, lock the screen. For Windows 7 just hit the“Windows + L” keys.

    -Create a Password recovery disk on a thumb drive. Go to control panel->User Accounts->Create a password recovery disk.

    -Create a restore points weekly. If your system is compromised or not working, youcan tell Windows to recovery from the last restore point you made. This is also greatif you have a virus or is your PC is working wonky, slow or simply not working.

    -The first line of protection for your PC is to make sure it’s updated. Update theOperating System, programs and Webrowsers.

    -Patch your BIOS. Find the make and model for your PC and search Youtube to seehow. You should only have to do this once or twice for the life of your PC and oncedone, it’s permanent

    -Install an Anti-Virus (AV). There are some great free anti-virus programs out theretoday. A trusted website for downloads is CNET. Or, AVG and Avast are a few greatfree AV’s. I used to work for a company that built the Point of Sales system for manymajor burger places and hey all use AVG free. Be sure to install them but be leery of selecting the paid version or installing unwanted programs. If you need help, search

  • 8/19/2019 101 Cybersecurity Tips for My Mom [HQ][Psycho.killer]

    4/15

    Youtube for instructions. Oh and by the way, you should only have one AV program.

    -The truth of any Anti-Virus program is that it has to learn how to recognize the virus before it can quarantine it. This means the AV’s virus definitions are at least three

    months behind. Kaspersky’s Lab detects 315,000 new virus’s a day1 so you can

    imagine how long it takes to reverse engineer them and put them in a database  AND

    THEN update everyone’s AV definitions across the planet. The bet Anti-Virus tool isyou. If your system all of a sudden starts to run slow or act weird or unpredictable for no reason, restore it to an earlier point.

    -Beware of bogus “We found a virus” warnings. Know what your AV warning lookslike and questions any program or ad that tells you differently.

    -Drive by websites that “FBI Lock” your browser wanting money to unlock them arefake and an attack. You may be able to close them by pressing “Ctrl+Atl+Del” ->starting task manager and ending the website.

    -Turn off your machines when not in use. The same goes for tablets, smart phones andyour router. I have an electronic timer that I picked up at Wal-Mart for $20 that onlyallows my router to be on for certain periods of time. My actual internet modem is

     plugged into this device as well.

    -MAC books and Apple iPhones get sick too. No system is safe.

    -Test your system. www.eicar.org

    . Should trigger even the most weakest of alarms. I never even made is past my

     browser when I tested.

    -Patching and updates. The longer hardware or programs live in the real world, thelonger hackers have time to find flaws and how to exploit them. Software needs

     patching as well. Applications, anti-virus, websites and operating systems.

    -Hardware (physical devices) run on firmware. It’s needs to be patched to the latestupdate. Routers, switches, BIOS, tablets, phones and laptops.

    -Allow all of your devices to patch and seek out the ones that don’t ask.

    -Beware of USB flash drive's auto play feature or U3 technology. If you find a USBdrive in the parking lot, it may contain a virus and upload itself as soon as it’s pluggedinto a device. There are several stories online where these devices were scatteredacross the parking lot of a bank and soon, the hacker had access to the banks Network.

    -If you buy a used PC or laptop or similar device, default and restore it to an originalstate or buy a new hard drive. They have software that can clean a hard drive, but if her is illegal file son it, you can still be held responsible.

    http://www.eicar.org/

  • 8/19/2019 101 Cybersecurity Tips for My Mom [HQ][Psycho.killer]

    5/15

     

    Routers

    Moving up to the network layer, your home router is next. It is also called a gatewayand controls communications on your network. This is the most critical device youown and warrants special attention. Each router looks different and will take somegetting used to.

    -Change the default administrator’s password IMMEDIATELY and remember, useyour passphrase (see passwords), I use my street address of “1234WestWaterfallChatanoogaTN45613”. This way I remember what my uppercasecharacters are and it allows me to use numbers as well. This password would take adesktop 69 tredecillion years to crack according tohttps://howsecureismypassword.net/

    . Save and restart when you are done.

    -Update your routers firmware. Again, refer to Youtube for make model and how to.

    -Use 5Ghz wireless setting if your devices support it. It has a shorter range but there isusually a very low number of neighbors that use this frequency. Wi-Fi frequencies aresimilar to being is a room with 10 other people all talking at the same time. It’s hard tohear your signal if the entire apartment complex is using the 2.4Ghz. The 5Ghz alsohas a faster throughput and a shorter range protecting you from people across thestreet. If you find yourself using just the 5Ghz or just the 2.4Ghz disable the frequencyyou are not using. There is plenty of information on your tube regarding 5Ghz and2.4Ghz.

    -If you are getting a weak signal, move your Wireless routers broadcast to a differentchannel like 1, 6 or 11. Remember that there are many types of interference that effectthe 2.4Ghz channel. Things like power panels, microwaves and refrigerators.

    -Use a strong Wi-Fi Password and the strongest security settings (WPA2-PSK (TKIP),WPA2-PSK (AES), or WPA2-PSK (TKIP/AES at the time of this writing). If your device doesn’t use a modern security settings, it’s becomes a security risk and it’stime to sell it. Again use a passphrase!

    -Walk around outside to see just how strong (and how far away) you or someone cansee your wireless access point. Compare 2.4Ghz to 5Ghz.

    -Enable wireless encryption if your devices support it.

    -You should consider replacing if it does not support 802.11g.

    -Never used a pre-owned router.

    https://howsecureismypassword.net/

  • 8/19/2019 101 Cybersecurity Tips for My Mom [HQ][Psycho.killer]

    6/15

    -Enable logging on your router. When you become more adventures, you can browsethe logs and see if you were or are being attacked.

    -There are several Myth’s for configuring your router and wireless accounts.Remember these DONTS (unless you are an advanced user).

    -Don’t disable your SSID. Sniffers can find it regardless and it just causes headacheshen you are adding new devices.

    -Don’t disable DHCP. Hackers can scan and spoof any IP that you are usingregardless. This also means don’t limit the address pool or change the default range.You will create a mess easy.

    -Don’t enable MAC address filtering. Hackers can see and spoof real MAC addressand again, you will be creating a mess.

    -The best advice for your router is to simply turn it off when not in use. Just make sure

    you save your routers configuration!-Keep your router out of reach. Lock it up if you can and use a Wi-Fi extender. Areport released in 2013 says that 11 of the 13 on off the shelf routers are easily hacked

    ith LAN or WAN (physical) access3.

    -Use a safe DNS source such as Open DNS4. When you type in a website URL likeGoogle, your Internet Service Provider uses their “DNS” to convert that name into anIP address and your Service Provider does not care if the page is infected or malicious. With Open DNS, inappropriate websites or site with adult context are

     blocked. Not only does this make the internet safe for the family, but Open DNS also blocks known malicious attack sites that auto download viruses.

    -Restart your router once a month and check for firmware updates. They are numberedso you can compare them to what your router has.

     

    Passwords

    A password is the first line of defense.

    -Use more than twenty characters. Use a sentence or passphrase, not a word. A passphrase is a long sentence of multiple words. Search Youtube for “Create uniquesecure passwords”. I have a great training video that will help. A few years ago I rana PC LAN party called LAN Dogs that specialized PC games and along with thatsecurity.

    -Use uppercase and lower case characters, numbers and symbols.

  • 8/19/2019 101 Cybersecurity Tips for My Mom [HQ][Psycho.killer]

    7/15

    -Avoid common words, phrases number sequences. If it’s easy for you to remember,then it’s easy to guess.

    -Should not contain any or your personal information such as dates of birth, familynames, SSN or phone numbers.

    -Change every thirty days.

    -Use a unique passphrase for every account.

    -Do not write down passwords or give them out.

    -Use a program such as LastPass, Keypass or 1Password.

    -Test your password at https://howsecureismypassword.net/

    -Same goes for pin numbers and phone logins. No common sequences or relatednumbers to your personal information.

     

    Unattended devices / Theft

    -Do not leave your devices unattended. Theft is real, and your loss will be too. The best way for a hacker to gain access is to have physical access to your device. Theyalways prefer to use the front door as it’s the easiest way to get into the house.

    -We know that our devices valuable but so is its access, history and data it contains.

    -Hang onto or do not carry debit or credit cards to prevent loss.

    -Don’t let people shoulder surf your phone or PC log in’s or passwords.

    -You your whole hand to cover the pin pad when entering your PIN, you know wherethe numbers are and don’t need to see it.

    -Don’t let others use your accounts even if it seems ok, like Fedex shipping accounts,sending an e-mail out, PC’s, Laptops or borrowing your phone.

    -Don’t use unknown ATM’s or withdraw money from weird locations. SearchYoutube for “Credit Card Skimmers” from ABC News.

    -Pull, push and jerk on debit card scanner to dislodge skimmers. Another value of using the same ATM’s is it will be easy to recognize skimmers or changes to theinterface.

    -Better yet, go inside to pay and use cash or credit.

     

    Controlled access to machines

    https://howsecureismypassword.net/

  • 8/19/2019 101 Cybersecurity Tips for My Mom [HQ][Psycho.killer]

    8/15

    -Use the same PC’s, ATMs and personal devices.

    -Use strong passwords on your own personal devices.

    -Don’t allow physical access to your devices. This included Laptops, PC’s, Tablets,Phones and networks, access points and wireless network.

    -Don’t allow people to connect to your wireless, Hotspot or plug into your router or switches.

     

    Data backup and recovery

    There is a saying in the IT world that is “You are only as good as your last backup”.Just like having car insurance you don’t wait until you need it to purchase it. PC’s die,hard drives fail, laptops go missing, it happens. I have pictures from when I was 5,how can I replace that?

    -Use an external hard drive and back up your files. Daily, weekly monthly. Ask yourself, what can you afford to lose? Google WD My Book for a great product.

    -Windows already sets up a file directory that organizes Libraries into Documents,Music, Pictures, and Videos. If you move your files into these directories, it makes iteasier to ensure that when you make a backup that you get everything.

    -Move the backup offsite to prevent loss by fire, flood or theft. Use a relative’s houseor a safety deposit box. Encrypt your data first!

    -Encrypt your device, your data and your log in. Use a strong password.

    -Build and use a NAS (Network Attached Storage). Google it.

    -Don’t use online backups. Online storage locations are not private. The companyowns those and have full access. If that company is subpoena in court, then the law hasfull access to your records. Keep privet things private. I suggest you encrypt your data

     prior to uploading it.

    -Encrypt your data. If it’s lost or stolen you have some protection. This is especially

    true on mobile devices like USB’s, flash drives, SD cards, external Hard drivestorage, Laptops, Tablets, cell phones or even online storage sites.

    -Be conscious of what you plug into your PC. Malware and virus can transfer acrossUSB’s, cell phones and other storage devices. Don’t use borrowed or found USBcords or chargers? They can contain SD cards and record your data.

     

    Going online

  • 8/19/2019 101 Cybersecurity Tips for My Mom [HQ][Psycho.killer]

    9/15

    -Search using the “incognito” setting on your browser. Search engines gather your search data and history to predict your next search and more importantly to bring upthe correct sponsored ads. These values are stored and mined to lead to you preferredsellers.

    -FBI Computer Locked Virus. If you hit this webpage, use Ctrl+Alt+Del and start

    Taskmanger. Under the Applications tab, select the website listed and hit End Task.

    -Tip Top security lists Chrome has been listed as the safest browser 2.

    -Use Chrome for your personal browser to check e-mails or log into bank accounts.

    -Use another web browser like Firefox to browse the internet to keep it separate fromyour private chrome browser. I have three browsers icons on my desktop that I use.One for a remote work connection, one for e-mail and one for surfing.

    -Book mark your banks URL’s. Never trust links. Be aware of what your URL should

    look like and if it look different this time, don’t log in.-Clear your search history daily or weekly. If you don’t know how, find out onYoutube.

    -Don’t use toolbars. Just, don’t. Or any other browser add on.

    -Do not allow your browser to store logins, passwords or links. This data can bemined by malicious websites or a virus.

    -Don’t trust bitly links from an unknown source or links that don’t reveal their 

    destination. Hover of it before clicking. Or, you can use a links scanner. Copy and paste the link into a site like URLVoid or MyWOT.

    -VMWare is a free download that lets you install any operating system that run in aindows safe environment on your PC. It simulates a PC running on your PC. You can

    install a separate copy of Windows 7 and save it the use it to surf online. If your PCgets a virus, you simple restart the machine. Security professionals will use a virtualsystem and allow it to get infected then let the virus “detonate” to see what the effectsare safely.

    -Check to see if a file or website contains a real virus by going hereww.virustotal.com

    .

    -Run a new website though www.siteadvisor.com

    . To see if it infected or malicious before you visit it.

    -Don't buy anything from a spammer who repeatedly send you e-mails or messages.

    http://www.siteadvisor.com/http://www.virustotal.com/

  • 8/19/2019 101 Cybersecurity Tips for My Mom [HQ][Psycho.killer]

    10/15

    -Don't Accept Offers of "Free PC Scans" That Pop up When You Use the Internet.

     

    -Don't Let Spammers See Your "Out of Office" Replies.

     

    -Be careful with Cybercafe computers, public computers or other peoples PC’s thatyou know especially if they are promiscuous online (use public Wi-Fi or don’t haven’tread this book).

     

    E-mail

    -Never use public or private accounts for personal data. If you use a school or work e-

    mail, remember that it’s not your data, it belongs to the schools. There is not privacy.

    -Public e-mail servers such as Gmail and AOL are not private. The company ownsthose and have full access. If that company is subpoena in court, then the law has fullaccess to your records. Keep private things private.

    -If the mosquito is the carrier of malaria, then e-mail is the carrier of the virus.Malware attacks, phishing, whaling, spamming, e-mail is the foundation of both digitalcommunication and malicious activity.

    -No e-mail is safe. Encrypt your messages. Gmail can do this for free. Remember thate-mails are sent in plain text and can be read in route to the receiver. It’s like sendinga post card vs a sealed letter.

    -Don’t reply to e-mails if they don’t make sense or are unexpected. If it’s acompliment, attack or an angry e-mail, they a designed to elicit a response whichallows the virus to alert the hacker that your e-mail account is real.

    -Don’t click on weird links unless you know someone is sending you something. Eventhen, scan that link. Some people don’t understand that a popular video, site of joke

    can contain a virus or attack. Also, even your trusted friends or family‘s account canget hacked. If you see a Viagra link from you son, delete it.

    -Be thoughtful of what e-mail service your using (AOL, Gmail, etc) and its historyith security and breaches. Send your information carefully. Consider moving to a

    secure e-mail service.

    -Use a strong passphrase.

    -E-mail is insecure by default because it is more like a postcard, not a sealed

  • 8/19/2019 101 Cybersecurity Tips for My Mom [HQ][Psycho.killer]

    11/15

    envelope. Emails are unencrypted and sent in plain text.

    -You can turn off the e-mail preview pane in Outlook or Outlook Express If themessage contains a virus it could detonate simply by scrolling through your slit. Never click on a suspicious e-mail.

     

    -Your inbox is a screening tool.

     

    -Don’t read e-mails if you don’t know who they are from.

     

    -Don’t click on links if you are not expecting it or don’t trust it.

    -Don’t run file types that end in, .exe, .zip or .msi unless you know who they are from.

    They will most always create viruses.

    -Don’t follow links that take you to company websites and ask you to log in unless youare expecting it.

    -Create several e-mail boxes to screen and ghost yourself. One should be used for admin purposes like logging into Linkedin, Facebook, websites, GoDaddy and gamingaccounts. Another for business and professional contacts. And yet another for a

     personal, close friends and family.

    -Use a super dumb long e-mail name to create confusion and a smoke screen. Givethese as a disposable e-mail address. When a I buy something at a store and they ask me for my e-mail I say no thanks, or giver them“[email protected]

    . The will give up halfway through.

    -Use a mail client for easy management. Outlook or Thunderbird for example.

     

    Trusted devices for trusted networks

    -Don’t connect to Wi-Fi networks that you don’t trust. If you do, use a disposabledevice or a Virtual Machine and an external NIC.

    -Use one of your disposable e-mail’s if required. Expect Spam.

    -Don’t log into PC’s and devices that you don’t own.

    -Don’t use public devices, PC’s or networks. Hackers use them and lay booby traps.

    mailto:[email protected]

  • 8/19/2019 101 Cybersecurity Tips for My Mom [HQ][Psycho.killer]

    12/15

    -Don’t use USB cable or chargers that aren’t yours. There are devices that can recordyour data and log your passwords.

     

    Social networks and info

    -Don’t reveal your location or that of your family. Be conscious of posted informationor live pics that have a background especially if you are out of town.

    -Some devices tag a Geolocation to your pictures. Disable it.

    -Your identity is at risk with social media, Personal information freely distributed andlikewise, fake accounts gain your trust. Don’t put faith in the high security settings, byits nature a social media is designed to share your information. Hence the name“social”.

     

    Debit cards

    -Use credit instead of debit. Debit cards pull “cash” directly from the account. Creditcards have specific protection laws that can allow stolen funds to be disputed andeasily returned. In the case of T.J. Maxx data breach in 2007, it took debit card user months to get their money retuned as opposed to the credit card users that got newcards and reverse charges in a few days.

    -If you can’t use credit, cover the whole keypad with your hand when entering your pin

    number. Even to the point where you can’t see it. This prevents shoulder surfers andskimmers from seeing you across the street with binoculars.

    -Use well known ATM’s that are in well-lit places to avoid skimmers.

    -You can’t always see a skimmer. Don’t use gas station pumps. The high traffic andopenness make them valuable targets for skimmers. Go inside and use cash or credit

    -I ate at a restaurant last week and they wanted me to pay with a wireless device at thetable. No thanks.

    -Don’t buy things online unless you trust the source. The web is a dangerous place.Even if you buy something from your laptop in your home on your wireless network,the data can be captured using a man in the idle attack.

    -Never use public Wi-Fi to make online purchases. Ever.

    -Disable links to your secondary accounts. I have the options to allow my bank toithdraw from my savings account should I overdraft. But his also allows thieves to

    access to not only my operational account, but my savings as well.

  • 8/19/2019 101 Cybersecurity Tips for My Mom [HQ][Psycho.killer]

    13/15

    -Spoof your public facing account. Walmart sells debit cards that allow you to usethem as credit or debit cards. These cards have a primary and a secondary “savings”. Iuse my Walmart account for my direct deposit from work and move the bulk to thesaving portion thus protected from thieves. I only transfer funds if I know that I amgoing to be paying bills and keep no more than $100 in the main account so I can havespending cash.

    -Along with my Walmart money card, every pay period I withdraw cash and move itto my bank account that I use for savings. I never use my bank account debit card.Ever. If I need money from savings for an auto repair, I go to the bank and make a cash

    ithdraw.

    -Paypal comes with a debit / credit card option. It’s easy to transfer money from your  bank to add funds but be careful of the auto withdraw options that allows Paypal to

    ithdraw from your bank account.

    -With some online financial accounts, you can use a virtual account number that isdisposable to pay for items.

     

    Mobil device (Smart phones and tablets)

    -Apps can hack and transmit your private data and geolocations. To hackers, they arethe back door to your home.

    -Phishing and ransomware attacks are just as prevalent on mobile devices as they are

    on a PC. Be wary with lesser known Apps even if you pay for them. Google them for security and known issues first.

    -What does an App get access to on your hone? When you install an App it shows youin what you grant it access to when you install it. Why does a calculator need access toyour personal image folder for?

    -If an App can make you believe it’s a trusted source, then you will click on it and itcan execute whatever malicious intention that it has.

    -Ransomware is increasing for mobile Apps. Think before you click or it may cost you

    $500 to unlock your phone (don’t pay, default your phone. These are most commonlyhidden in a video player for a specific website.

    -Resist using your mobile device to bank with. Texts are ok but an unwanted App cansteal the unencrypted bank log in from your memory and send it out via text message.This is called a “Man in the Browser” attack. Thieves can basically own your cell

     phone and desktop.

    -Some attacks using malware never really took off. Like the class known as the

  • 8/19/2019 101 Cybersecurity Tips for My Mom [HQ][Psycho.killer]

    14/15

    “Crypto Mining” attacks. They look for digital currency on your phone like Bitcoin.Even if you don’t use Bitcoin, they can still attack. If your phone runs out of batterylife fast or seems slow, check your running Apps and you may find it.

    -It’s said that the Y generation is the sharing generation. Just remember that once it’sonline it can’t be gotten back.

    -The top 10 flashlight Apps in 2014 were found to gain access to your personalinformation and send out to a main location via your cell connection without your knowledge. This includes Geolocations.

     

    When you buy a car there are many types of makes and models. Some cars have greatgas mileage, some have comfort and space. Smartphones and tablets also have optionsinherent to the phone itself, but also to the service that your provider offers. Servicesyou should have on your smart phone should be:

    -The ability to encrypt of remotely wipe the phone in case of loss or theft.

    -The ability to encrypt your data when uploaded to your PC.

    -While rooting or Jail breaking your phone seems cool, you are defeating someinternal security measure that may allow unwanted Apps to install. Just as you never 

    ant your primary PC login account to be an administrator, if your phone is rooted,then any unwanted App has full access.

    -Limit your mobile number to the public. Scanning bots gather data and flood

    cyberspace with unwanted calls and texts. Don’t reply.

    -Disable all connection abilities if not in use. Bluetooth, Wi-Fi and hotspots.

    -Wipe your devices prior to selling them.

    -Act quickly if your device is lost or stolen and call your service provider.

    -Do you know your device’s IMEI number? Learn it.

     

    About the author 

    Brian Sanchez has a BA in Network Engineering and has his CCNA and Security+certifications. He is actively employed as a Network Administrator and author. Hecurrently works or the largest privately held business is North America whom is alsothe largest car buyer in North America. He maintains the network and wireless accessand security for more than 8,000 locations in a multitude of countries including the US,Ireland, Scotland, UK, Spain, Germany, PR, Hawaii and Canada.

  • 8/19/2019 101 Cybersecurity Tips for My Mom [HQ][Psycho.killer]

    15/15

     

    -Kerpasky’s Lab Online article 2013 http://www.kaspersky.com/about/news/virus/2013/number-of-the-year 

     

    -TipTopSecurity 2015 http://tiptopsecurity.com/safest-web-browser-chrome-firefox-

    ie-opera-safari-comparison-chart/-Cnet 2013. http://www.cnet.com/videos/home-wi-fi-routers-are-easily-hackable-says-study/

    -Open DNS https://www.opendns.com/

     

    Legal stuff 

    Some names and identifying details have been changed to protect the privacy of 

    individuals. This is a work of fiction and personal opinion and personal experience. Names, characters, businesses, places, events and incidents are either the products of the author’s imagination or used in a fictitious manner. Any resemblance to actual

     persons, living or dead, or actual events is purely coincidental. I have tried to recreateevents, locales and conversations from my memories of them. In order to maintaintheir anonymity in some instances I have changed the names of individuals and places,I may have changed some identifying characteristics and details such as physical

     properties, occupations and places of residence. Although the author and publisher have made every effort to ensure that the information in this book was correct at press

    time, the author and publisher do not assume and hereby disclaim any liability to any party for any loss, damage, or disruption caused by errors or omissions, whether sucherrors or omissions result from negligence, accident, or any other cause. This book isnot intended as a substitute for the legal advice of lawyers. The reader shouldregularly consult a lawyer in matters relating to his/her small business ventures andinvestments. The information in this book is meant to supplement, not replace, proper education. Like any startup or business venture involving investment, money, and other financial factors, starting a small business poses some inherent risk. The authors and

     publisher advise readers to take full responsibility for their safety and know their 

    limits. Before practicing the skills described in this book, be sure that you are wellinsured, and do not take risks beyond your level of experience, aptitude, training, andcomfort level. The company and band names in here represent themselves and in no

    ay shape or form do I promote or condom them. They have all rights reserved.

    © 2014 The Paper Napkin Idea Company. All rights reserved 1st edition.

     

    https://www.opendns.com/http://www.cnet.com/videos/home-wi-fi-routers-are-easily-hackable-says-study/http://tiptopsecurity.com/safest-web-browser-chrome-firefox-ie-opera-safari-comparison-chart/http://www.kaspersky.com/about/news/virus/2013/number-of-the-year