Skip to main content

2014 | Buch

10 Don’ts on Your Digital Devices

The Non-Techie’s Survival Guide to Cyber Security and Privacy

insite
SUCHEN

Über dieses Buch

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and phishing attacks and emerging threats that exploit cloud‐based storage and mobile apps.

It’s a wonderful thing to be able to use any of your cloud-synced assortment of desktop, portable, mobile, and wearable computing devices to work from home, shop at work, pay in a store, do your banking from a coffee shop, submit your tax returns from the airport, or post your selfies from the Oscars. But with this new world of connectivity and convenience comes a host of new perils for the lazy, the greedy, the unwary, and the ignorant. The 10 Don’ts can’t do much for the lazy and the greedy, but they can save the unwary and the ignorant a world of trouble.

10 Don’ts employs personal anecdotes and major news stories to illustrate what can—and all too often does—happen when users are careless with their devices and data. Each chapter describes a common type of blunder (one of the 10 Don’ts), reveals how it opens a particular port of entry to predatory incursions and privacy invasions, and details all the unpleasant consequences that may come from doing a Don’t. The chapter then shows you how to diagnose and fix the resulting problems, how to undo or mitigate their costs, and how to protect against repetitions with specific software defenses and behavioral changes.

Through ten vignettes told in accessible language and illustrated with helpful screenshots, 10 Don’ts teaches non-technical readers ten key lessons for protecting your digital security and privacy with the same care you reflexively give to your physical security and privacy, so that you don’t get phished, give up your password, get lost in the cloud, look for a free lunch, do secure things from insecure places, let the snoops in, be careless when going mobile, use dinosaurs, or forget the physical—in short, so that you don’t trust anyone over…anything.

Non-techie readers are not unsophisticated readers. They spend much of their waking lives on their devices and are bombarded with and alarmed by news stories of unimaginably huge data breaches, unimaginably sophisticated "advanced persistent threat" activities by criminal organizations and hostile nation-states, and unimaginably intrusive clandestine mass electronic surveillance and data mining sweeps by corporations, data brokers, and the various intelligence and law enforcement arms of our own governments. The authors lift the veil on these shadowy realms, show how the little guy is affected, and what individuals can do to shield themselves from big predators and snoops.

Inhaltsverzeichnis

Frontmatter
Chapter 1. Don’t Get Phished
Stay Out of the Net
Abstract
Joe is a midlevel procurement manager with 14 years of experience at the multinational company Worldwide, Inc. His section is a large one, and much of the procedural updating that regularly comes through official channels is disseminated virtually—by text, the corporate instant messaging application, or e-mail. Joe rarely sees his immediate supervisor during the course of an average day and is accustomed to getting—and following—electronically delivered policy and housekeeping directives. Joe’s communications with administrators from other sections in his division also typically come through company e-mail. From time to time updates to the company’s IT systems require him to change his existing passwords or create new ones, so he is not uneasy when he receives a routine e-mail from his company’s IT group directing him to update his system password (see Figure 1-1).
Daniel G. Bachrach, Eric J. Rzeszut
Chapter 2. Don’t Give Up Your Passwords
Keep the Keys Safe
Abstract
Jackie, a newly hired HR database administrator (DBA) at a major state university, has several years’ professional experience working with big data. In her first week Jackie is “on-boarded” into the position. She is immediately granted full access to a large number of university systems and databases, which have disparate password and access requirements. Because of an absence of coherence across departments and university subunits (which is typical of large organizations), Jackie has to learn several new logon procedures for these assets. Some of the more sensitive systems at the university depend on “two-factor” authentication, requiring Jackie to use a physical identity (sometimes called an authentication or cryptographic) token in combination with a password.
Daniel G. Bachrach, Eric J. Rzeszut
Chapter 3. Don’t Get Lost in “The Cloud”
Stay Grounded
Abstract
Mike, a formerly self-employed graphic designer, was recently hired on full-time as a marketing associate at Worldwide, Inc. While he was working as a freelancer, Mike made regular, liberal use of cloud-based services like Dropbox and Adobe’s Creative Cloud. “Cloud” storage services, which house users’ files on servers maintained in the provider’s physical plant(s), allowed Mike to access all of his data using multiple devices, from almost any physical location.
Daniel G. Bachrach, Eric J. Rzeszut
Chapter 4. Don’t Look for a Free Lunch
If It’s Too Good to Be True…
Abstract
Elizabeth is a biochemistry researcher at a small, privately owned, pharmaceuticals firm. In preparing white papers and presentations demonstrating results of her lab work for investors, clients, and other key stakeholders, Elizabeth makes extensive use of videography. This includes video of animal subjects (primarily mice) in the lab as well as from her microscope work showing cell interactions with drug compounds.
Daniel G. Bachrach, Eric J. Rzeszut
Chapter 5. Don’t Do Secure Things from Insecure Places
Location, Location, Location…
Abstract
Tom is a senior sales associate for Magnatec Inc. (MTec), a large, US-based business-to-business (B2B) electrical parts supplier. He has current customers in 42 of 50 states and the potential for customers in all 50. Not surprisingly, Tom spends a great deal of his time on the road making sales calls to potential customers and servicing current customers. MTec has assigned him the typical road warrior “tools of the trade”—a laptop, tablet, and smartphone. All of Tom’s gear is preconfigured by his corporate IT department. Tom takes advantage of Internet access wherever he happens to find himself: hotel rooms, coffee shops, customer conference rooms, fast-food restaurants, public restrooms, etc. He is totally indiscriminant and approaches the decision to use an available Wi-Fi based solely on convenience. When he finds a reliable and fast Internet connection, Tom often has four to six hours of work to catch up on. This can include entering new sales orders, sending queries to his sales team, requesting technical support, submitting receipts for per diem reimbursements, and the like. Tom is on the road roughly 150 days a year, so he’s often catching up on his personal to-do list as well. Paying bills, checking credit card statements, and sending receipts for tax purposes to his accountant are all on his list.
Daniel G. Bachrach, Eric J. Rzeszut
Chapter 6. Don’t Let the Snoops In
Keep Your Personal Data Personal…
Abstract
Maria is an attorney who specializes in issues of privacy. She advises clients on the application of encryption methods, secure transmission of data, data protection overseas, etc. She counsels corporate clients on their rights concerning information and data related to disgruntled or terminated employees, and company rights bearing on examination of employee-used laptops and other devices. On corporate-owned devices, including phones and tablets, users can have absolutely no expectation of privacy. The firm can monitor and track all employee communications—work-related and personal—and look at all of their data at will. Because of Maria’s expertise in this area, her friends and family come to her with their personal privacy concerns as well. Her friends hear about current scandals and stories in the news, such as the recent Edward Snowden case, about search engines like DuckDuckGo and browsers like Tor, and ask Maria’s professional opinion of these events. Although she advises them to maintain their privacy to as great an extent as possible, she also admits that the open nature of the Internet is mechanically somewhat antithetical to the maintenance of total privacy.
Daniel G. Bachrach, Eric J. Rzeszut
Chapter 7. Don’t Be Careless with Your Phone
We’re Going Mobile…
Abstract
Jason is the regional manager of a large restaurant franchise, overseeing operations for 32 limited-menu restaurants in a major metropolitan area in the Northwest. Although his work requires him to be in regular daily contact with his location mangers and suppliers, his corporate parent does not provide him with a corporate cell phone. Jason uses his own phone in a bring your own device (BYOD) arrangement to send and receive e-mail from his corporate account and communicate with his managers and assistant managers as well as his supply chain contacts. In order to connect to his company’s e-mail server, Jason is required to use a four-digit PIN on his phone. Some other rules and regulations are displayed on screen, but Jason simply clicks “agree” without reading those.
Daniel G. Bachrach, Eric J. Rzeszut
Chapter 8. Don’t Use Dinosaurs
They’re Extinct for a Reason
Abstract
Sue is an experienced marketing vice president at a Fortune 100 athletics gear merchandising firm with a nationwide distribution and retailing network. She left her laptop at home while on vacation with her family, visiting her parents in the mountains, and didn’t realize it was gone until she arrived. Sue feels naked without her computer. She also doesn’t like to use other people’s machines for her work. However, she had a few remaining things to get off her plate before she could really relax.
Daniel G. Bachrach, Eric J. Rzeszut
Chapter 9. Don’t Trust Anyone Over . . . Anything
The Perils of Social Engineering
Abstract
Darren is a newly hired financial analyst for a major e-retailing company with a background in database management, software integration, and big-data modeling. He was hired as part of a broadscale company reorganization following several recent acquisitions. Darren’s group is part of a brand new unit within the parent company, with incompletely established functional boundaries. Four weeks into his new position, Darren is still learning the proper procedures, reporting relationships, colleagues’ names, and general operating system parameters. Everything feels very up in the air for Darren—a very common feeling. He receives a phone call at work, which is purportedly from the IT help desk affiliated with his group. Although the caller ID on his desk phone may have indicated an external call, in the midst of a hectic moment Darren didn’t notice.
Daniel G. Bachrach, Eric J. Rzeszut
Chapter 10. Don’t Forget the Physical
We Are (Still) Living in a Material World
Abstract
Tanya is the senior gastroenterological fellow at a large private hospital in a medium-sized city in the Northwest. As a physician working for a large, diverse practice, she is well versed in the protection of medical data, HIPAA (Health Insurance Portability and Accountability Act), .and similar medical records–keeping regulations intended to help preserve the privacy of patients’ personal medical data. In order to maintain up-to-date patient records, which takes her hours at the end of each workday, Tanya has a work laptop computer she uses at home that connects her to the hospital’s servers via a VPN (virtual private network), which is completely secure
Daniel G. Bachrach, Eric J. Rzeszut
Conclusion. Conclusion
Where Do We Go from Here?
Abstract
Our professional intersection with—and investment in—the material we try to condense and describe in this book goes much deeper than our somewhat removed role as authors. We do hope that here we’ve been able to offer an easily digestible, essentially linear (entertaining?) framework for both understanding and, even more important, contending with emergent and constantly evolving threats to end users’ data security. Broad consumption of even some of the cautions we offer, by sophisticated non-techies trying to function in an environment where the rules of play—and even the game itself—are constantly in flux, has potential to stem some of the truly mind-boggling data and security losses we’ve all read about and unfortunately even experienced first-hand.
Daniel G. Bachrach, Eric J. Rzeszut
Backmatter
Metadaten
Titel
10 Don’ts on Your Digital Devices
verfasst von
Daniel G. Bachrach
Eric J. Rzeszut
Copyright-Jahr
2014
Verlag
Apress
Electronic ISBN
978-1-4842-0367-5
Print ISBN
978-1-4842-0368-2
DOI
https://doi.org/10.1007/978-1-4842-0367-5

Premium Partner