Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

Before You Resort to a Tin Foil Hat

DZone's Guide to

Before You Resort to a Tin Foil Hat

A weird checklist of obvious but often overlooked non-cryptographic security practices to keep your, and your company's data, safe.

Free Resource

Discover an in-depth knowledge about the different kinds of iOS hacking tools and techniques with the free iOS Hacking Guide from Security Innovation.

The most advanced encryption won’t help you secure the data if the overall approach to security is careless or presumptuous. The smarter you are, the more secure is your data. Right? Wrong! The more we know, the more we think that some of the rules do not apply to us, and the less time we dedicate to the boring yet necessary security measures.

Apply any level of complicated cryptography you want, but when the common sense principles of data security are ignored, no cryptography will save you. What’s the use of the mega secure password if it’s taped to your designer’s monitor?

Even in our security engineering office at Cossack Labs, where we design and develop sophisticated data security tools and should be quite attentive to security, every once in a while someone forgets to lock the desktop while leaving to grab a coffee, and gets a locomotive in their shell in their ~/.bash_profile.

And, by the way, if you think that the simple yet effective rules of common sense data security don’t apply to you, you’re already violating the rule #1:

You Are a Target for Malicious Attackers, Remember That

Yes, you. Although we, human beings, tend to cultivate the comforting “oh, it’s so stupid\awful, it won’t ever happen to me” approach, you never know, and it’s better to keep the guards up. Better (excessively) safe than sorry if your work has some specific demands towards data protection or actually revolves around data security.

Practice Good Password Management

Never share passwords. Pick strong passwords (that won’t fall prey to a rainbow table attack or simple brute force) and keep them private, preferably not in plaintext.

Use Two-Step Authentication Wherever Possible

Use the code that the verification system sends to a landline phone or cell phone, via SMS (although that’s a bit of a risk), via multi-factor authentication system like Google Authenticator. Remember that even two-step authentication has risks and vulnerabilities and cannon be the be-all-end-all of your data security.

Activate Foreign Login Alerts

Monitor your accounts for suspicious activity. Knowing the details of each new login into the account/system makes it easier to stop a possible breach in its tracks.

Inspect the Resources That Ask for Your Username/Password

Every time you are asked for your personal information (in a web form, an email, a text, etc.) think if you can really trust the request. Scammers and phishers will go a long way to steal your information.

Digitally Sign Your Email

Secure your mail with a digital signature. This provides assurance that it was you — not somebody else — who signed the contents of the email.

Practice the Principle of Least Privilege (PoLP)

Don’t log into a computer with administrator rights unless you absolutely must do so to perform specific tasks.

Keep Your Environment Secure

Install and maintain security software, use a firewall. Also, use a security-friendly operating system; keep your software updated by applying the latest service packs and patches as they arrive.

Only Use the Software From Known and Trusted Sources

Check the newly downloaded software thoroughly, using reputable virus detection software. Check hash sums to verify the integrity of downloaded files.

Remove Unnecessary Programs or Services From Your Computer

Uninstall any software you’re not using. This will protect you in case the software that just lies dormant on your machine becomes compromised through a previously unknown vulnerability.

Avoid Public Wireless Hotspots (Like the Plague)

If you really need to connect to that public Wi-Fi spot, at least make sure to turn off the file sharing and mark the Wi-Fi connection as a public network. Turn on the firewall if it’s not already activated. Better still — use a VPN.

Don’t Click Random Links

In terms of damage caused to humanity in recent years, this should be the rule #1. Never click suspicious links. Suspect everything. Beware of email or attachments from unknown people, or with a strange subject line. Never open an attachment you weren’t expecting (even if it looks innocuous). If you don’t know the sender, better delete the message without reading it. Needless to say, propagating chain mail or viral hoaxes is plain stupid.

Be Careful of What You Share on Social Networks

Don’t be that person who overshares on Facebook or live-Tweets every step of their vacation (to find their apartment robbed afterward). Beware of suspicious emails and phone calls that ask for personal or financial information. Treat your personal information like you would treat cash — this helps you avoid phishing and social engineering. Don’t hand your info out to just anyone.

Only Provide Your Personal Information Over Encrypted Connections

For online banking or shopping, stick to trusted sites that use encryption to protect your information. To determine if a connection to a website is encrypted, look for `https` at the beginning of the web address (the “s” is for secure or check for the “lock”) on every page. Log out after you’ve completed the transaction. Remember that some sites only use encryption on the login page, which means that all your further actions on such resources could be compromised and your data stolen.

Perform Regular Backups of Your Data Using Several Forms of Media

Secure your external/backup data drives. If you keep sensitive information on a flash drive or external hard drive, make sure to keep these mediums locked.

Watch What You Plug Into Your Computer

Remember that thumb drives and smartphones can also contain malware. They can even burn your computer!

Never Leave Your Device Unattended

Lock your computer if you step away, even for a moment. Period. Never leave devices unattended. Their physical security is just as important as their technical security.

Restrict Remote Access

Disable file and print sharing. If you absolutely must share a resource with others, correctly set the file and directory permissions. Only enable remote connections when needed, disable them when you’re finished.

Treat Sensitive Data Very Carefully

Keep things like credit card information, student records, health information, etc. off of your workstation, laptop, or mobile devices.

Remove the Data You No Longer Need in a Secure Way

Remember that simple deletion of sensitive materials is not enough — use disk wiping ( a method that writes a series of 1's and/or 0's over the disk to securely remove the data). Physically destroy the media containing sensitive data that cannot be wiped (i.e. CDs, DVDs, etc.). For the destruction of paper documents, use (at least) a cross-cut paper shredder.

Visit us on GitHub for a healthy dose of cryptographic tools.

And of course — use encryption wherever possible.

Summary

Even though we provided lighthearted illustrations to make this extensive list of rules (that could make Captain Obvious happy) an easier read, information security is not a matter to be taken lightly. The best approach to protecting the data you can take is to keep in mind the basic set of Murphy’s laws and act knowing that:

  • Everything that could go wrong with your data will go wrong.

  • If you have just one backup, you have no backup.

  • If it seems too stupid and/or obvious, you should mention it anyway, or better still, make it a printed regulation.

  • Your data could be compromised even if you are careful, but if you’re careless it will be compromised.

  • They are watching you.

Learn about the importance of a strong culture of cybersecurity, and examine key activities for building – or improving – that culture within your organization.

Topics:
data security ,infosec ,encryption ,security ,security best practices

Published at DZone with permission of Eugene Pilyankevich, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}