Posts Tagged ‘Defence in Depth’
V. Thou shalt cast aside e-mails from strangers and not open attachments/click links they may send you.
Summary: I’m going to start this summary with some scary figures. 93% of phishing e-mails in Quarter 1 2016 have carried a Ransomware payload (source – PhishMe Q1 2016 Malware review). 30% of people that receive phishing e-mails open them and 12% of those that do, then open attachments or click on links (source –…
Read MoreIV. Thou shalt always backup thy data and regularly check its integrity.
Summary: In conjunction with the first, second and third commandments … are you seeing a pattern here? By following each of these simple commandments, you are providing additional layers of defence against the evil doers. This is what security experts refer to as Defence-in-Depth. The more precautions you take, the more difficult it makes life…
Read MoreIII. Thou shalt have a firewall in place on thine Desktop/Laptop as well as thine internet connection.
Summary: In conjunction with the first and second commandments, having a Firewall in place on your desktop or laptop improves your security posture as it adds another layer of protection in the fight against the evil doers. It is by no means a perfect solution on its own, as a poorly configured firewall would offer…
Read MoreII – Thou shalt have Anti-virus software installed, updated and active.
Summary: In conjunction with the first commandment, having Anti-Virus software installed, updated and active on your desktop, laptop or mobile device dramatically improves your security posture. This adds another layer of protection in the fight against the bad guys. Don’t for one second think that just having Anti-Virus on your device will give you enough…
Read MoreI – Thou shalt keep all of thy software and apps up-to-date with automatic updates.
Summary This is the first commandment for a reason. It is probably the number 1 step to reducing your risk of being compromised by hackers or malware. The reason for this is because hackers discover vulnerabilities in applications that are widely used (web browsers, e-mail clients, office productivity suites, etc.) and exploit these vulnerabilities to…
Read MoreInternet Security Awareness and Safety Training
Justification: Did you know that malicious software gets past commercial, enterprise grade anti-virus and e-mail filtering products on a worryingly regular basis? Firewalls and Anti-virus packages lure people into a false sense of security. While they do provide protection up to a point, if somebody opens an e-mail attachment that contains new malicious software, these…
Read More