Smaller privileges and "passwords", and not "passwords"

Anonim
Smaller privileges and

New portion of nontrivial IB councils.

Practice the principle of the smallest privileges (POLP)

Indiana University Information Technologies are recommended to follow the principle of the smallest privileges (POLP).

Do not enter the computer with administrator rights, unless you have to do this to perform certain tasks. Run a computer with administrator rights (or an experienced user in Windows) makes your computer vulnerable to security and exploit threats. A simple visit to an unfamiliar website with these high-level privilege accounts can cause serious damage to your computer, such as reformat the hard disk, delete all your files and create a new user account with administrator rights. access. When you still need to perform tasks on behalf of the administrator, always follow safe procedures.

Use "passwords", and not "passwords"

It is recommended to use password phrases - a series of random words or a sentence. The more characters contain your password phrase, the more stronger. The advantage is that they are much easier to remember and introduce, but is still difficult for cyber intruders. hack.

Enchant data on USB drives and SIM cards

Encryption of your data on removable storage devices may difficult (although not impossible) attackers interpret your personal data in case of loss or theft of your device. USB drives and SIM cards are excellent examples of removable storage devices that can simply connect to another device, which allows the user to access all data stored on it. Unless, of course, it is not encrypted. Your USB drive can be easily stolen and inserted into another computer, where they can steal all your files and even install malware or viruses on your flash drive, which will infect any computer to which it is connected. Encry your SIM card in case your phone ever stole, or pull it out if you sell your old mobile phone - said Mike Juba.

Do not store passwords on a laptop or mobile device

The sticker from the outside of the laptop or tablet "is akin to what to leave the keys in the car," the director of the Ohio University Information Technology Director said. Similarly, you should not leave a laptop in the car. This is a magnet for personal data kidnappers.

Disable sharing files and media files if you do not need them

If you have a home wireless network to which several devices are connected, you can conveniently exchange files between the machines. However, there is no reason to make files publicly available if it is not necessary. "Make sure you provide sharing to some of your folders only in the home network. If you really do not need your files to be visible to other machines, completely disconnect the sharing and multimedia files. "

. Smaller privileges and "passwords", and not "passwords"

Source - Vladimir's blank blog "be, not to seem. About security and not only. "

More interesting material on cisoclub.ru. Subscribe to us: Facebook | Vk | Twitter | Instagram | Telegram | Zen | Messenger | Icq new | YouTube | Pulse.

Read more