Cyber Hygiene - Keeping Your Devices Clean

How often do you receive a CD or a USB from friends or family with something of interest? If you simply drop the CD into the drive or stick the USB stick into the slot and run, you are entrusting the security of the device to the security protocols used by that friend or family member.
This post was published on the now-closed HuffPost Contributor platform. Contributors control their own work and posted freely to our site. If you need to flag this entry as abusive, send us an email.

2015-10-01-1443716801-8280042-cyberhygiene.jpg

Today we focus on cyber hygiene.

We'd like to take the credit for coining the phrase, but we didn't, but we use it a good deal. According to the Collins Online Dictionary notes: "Cyber hygiene refers to steps that computer users can take to improve their cybersecurity and better protect themselves online."

2015-10-01-1443716890-4500032-NCSAM01OCT2015.png

Practice good cyber hygiene with devices:

PC, laptop, smartphone, tablet, etc., any digital memory device be it an external hard drive, USB stick, smart-card memory chip, or compact disc, disable the auto-run feature for your device. Why? With auto-run enabled, any executable file (read malware/virus program) will automatically begin running, and your device will become infected. What you want to do is have your antivirus software program inspect the external data source before you allow it to run an executable file so as to detect and neutralize any virus.

You might be thinking, well I only use new digital memory devices -- which is what IBM thought in 2010 when they handed out USB sticks to delegates attending the Australia CERT (Computer Emergency Response Team) security conference which contained malware. (Read the letter IBM sent to the delegates of the AusCERT where they used devices which came infected from the manufacturer.)

How often do you receive a CD or a USB from friends or family with something of interest? If you simply drop the CD into the drive or stick the USB stick into the slot and run, you are entrusting the security of the device to the security protocols used by that friend or family member.

Like the pureness of Ivory Soap, 99.44 percent of the time there is nothing there, but why take the chance?

----

This article by Christopher Burgess is crossposted from Senior Online Safety with permission.

2015-10-01-1443716854-2638939-KeepaCleanMachine.png

October 2015 is the fifth anniversary of the National Cyber Security Month campaign of "Stop Think Connect."

Popular in the Community

Close

What's Hot