We all carry mobile devices be they phones, iPads or other tablet devices, USB drives or laptops. By their very nature, these devices are easily lost or stolen making the data on them at risk of compromise. It’s important to protect the actual devices from loss, but perhaps it’s even more important to protect the information that resides on them. Here’s how to accomplish that:
- Make regular backups of all critical data
- Securely wipe all data from a device before you discard it, donate it or give it away.
- Encrypt all sensitive data
- Use anti-malware software and keep it up to date
- Keep up with security updates for all software on your device
- If your device has a means to wipe it out if it is lost, be sure to configure this option.
Tired of resetting certain students’ passwords numerous times (will they EVER remember them?), this administrator replied to an instructor’s request for a password reset with this email:
It’s on the way to you.
Please send him to see me ASAP for his tattoo. My new policy is that after the third password reset, the student must change the password in my presence and have it tattooed permanently on the inside of his or her left arm. The password tattoo, which will be in black 36 pt. Droid Sans with slashed zero and European 7 and Z glyphs, is free. There is a $100 extra charge for aesthetic enhancement unless the student prefers to do it herself. I would encourage you to instruct them on how to design graphics around their password so that it also serves as a mnemonic. I have attached an example for your reference.
Optional: Students who don’t know how to type or otherwise operate a computer may purchase the RFID package ($150) in lieu of the tattoo. I will implant the chip in their forehead, allowing them to log in by simply banging their head against the PC (something I have been doing much more frequently these days).
Oh, I forgot to mention this: my tattoo gun is currently in the shop. Until I get it back, all tattoos will be done using the old sewing needle/thread/India ink method. This is much more painful, but just as effective.
If you or your students have any questions about this policy, feel free to drop me a line.
In the wake of recent news about Germany’s considering using typewriters instead of computers to thwart electronic surveillance, one has to ask the obvious question: Huh?
Oh, they have to be manual typewriters. Electric ones just won’t do (you can plug in a keylogger to an electric one, apparently). Makes sense, especially in light of how IBM Selectric typewriters were hacked in the 1980s. Here’s how an installed spy sensor (bug) worked, according to CBS News:
“The devices picked up the contents of documents typed by embassy secretaries and transmitted them by antennas hidden in the embassy walls. The typewriters used a round ball with numbers and letters around the surface, which revolved before hitting the ribbon against the paper. The bugs could work out each letter typed by detecting how the ball moved.”
I don’t think that manual typewriters would solve this problem. Someone will develop a way to tell which key was pressed by the audio spectrum analysis of the “clack” sound the letter hammer makes as it hits the ribbon and paper. It doesn’t even have to be so complicated. You can just go back to the old low-tech spy methods like posing as a janitor and stealing the ribbons or relying on security lapses and stealing documents that should have been shredded.
Spying isn’t going to go away no matter the technology being used. Only on the day when we can fully trust each other will spying become unnecessary.
Mobile devices such as smartphones, tablets and laptops are certainly convenient; however, due to their portability they are security risks. It’s just too easy to lose or misplace these devices and when this happens, all of your personal data stored on them is at risk of being compromised. You don’t want that to happen, so be sure to:
- Keep smartphones and tablets with you at all times when in public. NEVER leave a device sitting and walk away from it, even for a second.
- Never leave a laptop in open view in your car. Lock it securely in your trunk and lock all the doors. Out of sight, out of mind.
- When in the office, use a cable lock on your laptop or store it in a locked drawer.
- Never put any of these devices in your checked baggage when traveling.
- Make a list of phone numbers and/or email addresses to report stolen or lost devices.
A future post will cover protecting the data itself.
Password Reset Dialog
WINDOWS: Please enter your new password.
WINDOWS: Sorry, the password must be more than 8 characters.
USER: boiled cabbage
WINDOWS: Sorry, the password must contain 1 numerical character.
USER: 1 boiled cabbage
WINDOWS: Sorry, the password cannot have blank spaces.
WINDOWS: Sorry, the password must contain at least one upper case
WINDOWS: Sorry, the password cannot use more than one upper case
WINDOWS: Sorry, the password cannot contain punctuation.
WINDOWS: Sorry, that password is already in use.
WINDOWS: Thank You, your password has been changed
Have fun and be safe!
I’m a fan of Gizmo’s Freeware and have been for many years. They have maintained a list of free security-related programs or web applications for some time. It’s called “Probably the Best Free Security List in the World.” They say,
This article contains a comprehensive list of free security-related programs or web applications for Windows XP and later Windows PC-based operating systems. The few non-free programs on this list are included because they are of high merit (in our opinion) and lack a comparable free alternative. This list also includes links to webpages that contain security-related information.
The list runs the gamut from malware protection of all kinds to firewalls, HIPS, virtualization, encryption, data rescue, and so much more, 24 categories in all. I was pleased to find several of my favorite go-to programs under the “System Cleaning” category, including Darik’s Boot & Nuke and Active@ KillDisk. Also, under “Data Rescue” are two programs I use frequently, Testdisk and Photorec. There’s also a comprehensive list of malware removal guides and help sites.
One very nice feature of this page is the keys that inform you of the presence of adware, nagware and OpenCandy.
This list makes my old Geek Toolkit obsolete!
Do you know who’s playing around on your computer when you’re not there? Think it won’t (or doesn’t) happen? Think again: It can and does happen all the time.
I’m sure you trust the people you work with, and rightfully so, but what about the maintenance crew and the janitorial service personnel? Several times this year, I have had to clean up computers in the reception area because someone got adware and toolbars all over them. The only possible explanation is that the cleaning crew people were surfing the web on them.
Had the night receptionist remembered to either shut down or lock the computers before she left, nothing would have happened.
The same goes for your workstation. If you leave it on, like many at my company do, you are at risk for someone using it when you aren’t around or, worse yet, getting confidential private information off of it.
If you lock the screen so it requires your password to get back in, you have just made it nearly impossible for an unauthorized person to get your information or wreck your system.
It’s a simple, but highly effective security practice.
Passwords are usually the frontline protection against unauthorized access. In fact, sometimes a password is the only protection. If you have weak passwords, you’re vulnerable to attack and compromise of your valuable data. If you have weak passwords and use those same weak passwords at multiple sites, you’re a disaster-waiting-to-happen.
There are two rules you should always follow.
1. Always create strong passwords. This means
- Don’t use your name, dictionary words (even foreign words), acronyms, or even common phrases or slogans.
- Don’t use prefixes or suffixes that use common keyboard patterns such as “Asdf1.” See Steve Gibson’s Password Haystacks page.
- Use a random mixture of upper case, lower case and special symbols. Even ASCII symbols such as ▐ (Alt-222) can be used.
2. Never use any password for more than one site. One site = one password.
If you have passwords on sites you don’t care about — as long as they don’t contain any personally identifiable information — you could use a throwaway password for those. Some sites just insist that you have a login when it really doesn’t matter. What comes to mind are pure news sites that you only read and that don’t force you to create a profile. Those would be the only exceptions, but I don’t even recommend that.
Bottom line: Create strong passwords and never use the same password for more than one site.
Today is Patch Tuesday and Microsoft’s seven updates address 66 security holes in Windows and related apps. Most of those vulnerabilities — 59 of them – are in Internet Explorer (MS14-035). No surprise there. It’s the most insecure mainstream browser ever developed. Most of the vulnerabilities were labeled “critical,” meaning the bad guys can exploit them without any conscious help from users. Again, no surprise. You can read all about it here.
Lest I be unduly unfair to Microsoft, Adobe’s update for the Flash Player plugin fixes six bugs. I have the plugin set to ask me if I want to play a video. It’s inconvenient, but a lot safer than trusting a proven insecure plugin.
Bottom line: Apply the patches and hope the bad guys don’t find something MS and Adobe missed in the meantime.
Despite the ominous warning on the redirected TrueCrypt page at SourceForge, the venerable encryption software is still safe to use. Noted security expert Steve Gibson of SpinRite and Security Now! fame recently posted an in-depth article on the GRC.com website here. To those pundits (including me, unfortunately) who have advised us to look elsewhere for encryption software, he says: “Those who believe that there is something suddenly ‘wrong’ with TrueCrypt because its creators have decided they no longer have so much to give are misguided.”
I do believe the way the TrueCrypt developers bowed out definitely tended to lower confidence in their creation, but when a developer of Gibson’s caliber says “And have YOU looked at their code? OMG, it’s truly a work of art. Whomever and wherever these guys are, SOMEONE is paying them some serious coin to create code of that caliber,” I tend to listen. I further will heed this level-headed advice:
Time to panic?
No. The TrueCrypt development team’s deliberately alarming and unexpected “goodbye and you’d better stop using TrueCrypt” posting stating that TrueCrypt is suddenly insecure (for no stated reason) appears only to mean that if any problems were to be subsequently found, they would no longer be fixed by the original TrueCrypt developer team . . . much like Windows XP after May of 2014. In other words, we’re on our own.
But that’s okay, since we now know that TrueCrypt is regarded as important enough (see tweets above from the Open Crypto Audit and Linux Foundation projects) to be kept alive by the Internet community as a whole.
So, thanks guys . . . we’ll take it from here.
I plan to continue to use TrueCrypt and be relaxed about it. We’ll see what develops, but already there is interest in picking up where the original developers left off:
TrueCrypt.ch: A just launched, Swiss-based, possible new home for TrueCrypt. Follow these folks on Twitter: @TrueCryptNext. Given the deliberate continuing licensing encumbrance of the registered TrueCrypt trademark, it seems more likely that the current TrueCrypt code will be forked and subsequently renamed. In other words . . . for legal reasons it appears that what TrueCrypt becomes will not be called “TrueCrypt.”
Bottom line: Continue using TrueCrypt without concerns and watch for what happens as it forks off.