Security Corner:

Security maxim

April 27, 2008  4:02 PM

If Your Laptop is Stolen, Will Your Identity be Stolen?

Posted by: Ken Harthun
Encryption, Mobile, Portable computing, Security, Security maxim

We frequently hear news of a laptop holding sensitive information having been stolen. Bad in itself, but the reports often note that the information was unencrypted. Doubly bad. The news rarely focuses on personal laptop thefts, however because there's no news value in reporting the loss of Joe...

March 12, 2008  2:04 AM

Turn Off Message Preview in Your Email Client

Posted by: Ken Harthun
email, Email security, Security, Security maxim

Some of these tips may very well be "everybody knows" types of things, but I find that these are often the things that get overlooked. That's why I'm publishing them as computer security maxims. Take a look at the recent furor surrounding the

February 28, 2008  1:30 AM

If You’re Not Patched, You’re a Target!

Posted by: Ken Harthun
Security, Security maxim, Vulnerabilities

OK. So you've installed a NAT router, you've changed the default login and passsword, and you've used an unguessable password. You've done everything right so far. However, you still may be vulnerable; in fact, you probably are, even if you keep your operating system patched. In a

February 24, 2008  1:07 AM

Can a Criminal Hacker Guess Your Password?

Posted by: Ken Harthun
Networking, Password, Security, Security maxim

In my last post, I stressed the importance of changing the default username and passwords of all configurable network devices. That’s good advice. But a weak password, one that is easily...

February 20, 2008  9:12 PM

Omit This Setup Step and Your Router Can Be Easily Compromised

Posted by: Ken Harthun
NAT, Networking, Routers, Security, Security maxim

Last time, I stressed having a NAT router--or router/firewall--between your PC and the Internet as a first line of defense. This is without question the first, most important security step, but it can be useless unless you have it properly configured; in fact, omitting one crucial first step can...

February 16, 2008  8:02 PM

How Not to Invite Attackers into Your PCs or Network – the First Line of Defense

Posted by: Ken Harthun
Firewalls, NAT, Networking, Security, Security maxim

The other day, I gave you what I consider to be the most basic security maxim, one on which I base all of my security practices: The best security measures are completely useless if you invite attackers into

February 13, 2008  7:28 AM

Introduction to Security Corner

Posted by: Ken Harthun
Security, Security maxim

Hello! The good folks at IT Knowledge Exchange and TechTarget have granted me the privilege of sharing my views on computer and network security with you. I'm proud to...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: