1
T o p 1 0 T e c h S e c u r ity B a s ic s E v e r y P e r s o n S h o u ld F o llo w
W e ta lk a lo t a b o u t c o m p u te r s e c u rity a n d d a ta s e c u rity h e re a t L ife h a c k e r, b u t y o u
c a n n e v e r h a v e to o m a n y re m in d e rs o f th e b a s ic s . H e re , in a n u ts h e ll, a re th e s e c u rity tip s a n d
h a b its e v e ry c o m p u te r u s e r s h o u ld k n o w . C o n s id e r it a q u ic k w a y to a u d it y o u r o w n s e c u rity
o r h e lp o th e rs y o u c a re a b o u t g e t th e e s s e n tia ls d o w n .
1 0 . W a tc h O u t fo r S o c ia l E n g in e e r in g A tta c k s
L e t’s s ta rt o ff w ith p e rh a p s th e b ig g e s t s e c u rity c o n c e rn : S o c ia l e n g in e e rin g . It’s h o w
h a c k e rs a n d d a ta th ie v e s
c le v e rly a c c e s s y o u r s e c u re
in fo rm a tio n th ro u g h p h is h in g ,
im p e rs o n a tin g o th e r c o m p a n ie s
a n d p e o p le , a n d o th e r c o m m o n
ta c tic s . B e s u s p ic io u s o f a ll
lin k s , e m a ils , p h o n e c a lls , a n d o th e r c o m m u n ic a tio n s , b u t a ls o k n o w th a t m o s t d a ta b r e a c h e s
c o m e f r o m in te r n a l s o u r c e s . Y o u m ig h t b e s u r p r is e d a t h o w e a s ily e v e n s e c u r ity e x p e r ts c a n
b e f o o le d o r h a c k e d , s o a w a r e n e s s is k e y .