Selasa, 30 April 2019

How to Bullet-Proof Your Online Privacy

When you imagine hackers and identity thieves violating your privacy, you might think of a pallid, 20-something hacker in a dark basement, wearing a hoodie, gulping Red Bull by the gallon, typing mysterious, high-tech commands rapid-fire on a keyboard to break into your email, social media site, or bank account.

In this scenario, your cyber nemesis is someone who knows tech way better than you do, and abuses that tech to exploit you.

But, having worked in the electronic intelligence field, at NSA and other three-letter agencies, I can tell you that violating—and protecting—your electronic privacy is not really about tech at all, unless you consider the human brain to be tech.

What I mean is this: Protecting your privacy is much more about understanding  human behavior than it is about understanding technology. For example, Rob Joyce a former NSA colleague and Chief White House Cybersecurity official, said recently, “Human factors like corporate leadership priorities are at the bottom of almost all of our cyber problems.” Rob should know—he ran Tailored Access Operations at NSA (which, according to Wikipedia “identifies, monitors, infiltrates, and gathers intelligence on computer systems being used by entities foreign to the United States.”)

One particularly problematic  “human factor” is use—and misuse—of passwords. A Verizon data breach report estimates that over 80% of hacking incidents stem from stealing, spoofing, or cracking passwords.

Violating—and protecting—your electronic privacy is not really about tech at all, unless you consider the human brain to be tech.

Why are passwords the major Achilles heel in cybersecurity and privacy protection?

Because using and protecting passwords is such a pain that almost everyone engages in bad cyber hygiene with passwords. Examples of bad hygiene are using easily guessed passwords such as “12345,” birthdays, or children’s names, or employing the same password (or variants of it) on 10-20 different accounts.

Although “strong passwords”—such as $%Fth&8H8j9ErQst—that change regularly and are used only for one account—seem like “good cyber hygiene,” in reality strong, frequently changing passwords are a staggeringly dumb idea because...

Keep reading on Quick and Dirty Tips

Tidak ada komentar:

Posting Komentar