Playlist

Safety Measures

by Frank Eilers

My Notes
  • Required.
Save Cancel
    Report mistake
    Transcript

    00:07 Sometimes all it takes is a click and everything turns black.

    00:11 But don't worry - your PC is fine, but you are now right in the middle of the problem.

    00:17 When we talk about security measures, we're talking about being proactive.

    00:22 That is, we take action before something happens.

    00:25 We may drastically lower our vulnerability to some types of assaults by taking this strategy. You're probably aware of the scenario.

    00:36 You're sitting in front of your computer, and it asks whether you want to install the newest update and restart it.

    00:42 And in most circumstances, this is what occurs to me.

    00:45 Yes, I believe I will do so tomorrow.

    00:48 The next day, I tell myself, "Yes, I'll do that the day after tomorrow," and then I don't. And this is the issue: we are out of date.

    00:56 Every update attempts to close the most recent security gaps, and this applies to both the Internet browser and the operating system, as well as any other type of software. And, as with all other apps, we always keep everything up to date to defend ourselves from threats.

    01:14 Is your anti-virus software current? Do you even have anti-virus software installed? Do you have a firewall in place? How about anti-spyware to prevent others from accessing your passwords? Please consider tablets and cell phones as well.

    01:33 Many people around the world use the password "123456." I sincerely hope this is not the case for you. I also hope you're not using your birth date or your spouse's or husband's first name.

    01:47 When it comes to creating a truly secure password, we should follow the rule of "the longer the better." And we're talking about 20 characters for extremely critical passwords - 20 characters containing upper and lower case, digits, and special characters. All of these should be included in your password.

    02:09 Furthermore, we should use separate passwords for each account.

    02:16 If you hack one, you hack all of them, which is not what we want.

    02:19 Furthermore, there should be no personal connection to us, and you are free to change the passwords at any moment.

    02:26 Now I'll give you a few more tips on how to construct your own secure passwords.

    02:31 You can get password cards online, which are similar to templates in that you know how to choose the password for a certain account.

    02:41 Or you may be extremely inventive: I did this here; this is my Facebook password.

    02:46 You can't access my messages because I definitely changed it yesterday.

    02:50 It appears to be complicated, but it isn't.

    02:56 I am always home by 6 p.m.; I love you.

    03:02 I remember it since it is related to my daily activity, which makes this password reasonably simple to remember.

    03:11 If you have the opportunity to implement two-factor authentication, please do it while on vacation. You open your email program, and then you receive an SMS code.

    03:24 You validate this code and present it to your provider.

    03:28 Hello, this is me; I have access to this account.

    03:33 One word about email: When perusing your email inbox, be cautious.

    03:40 Why? Email is being used as a tool by an increasing number of attackers.

    03:45 I provided a real example for you; obviously, the names have been adjusted slightly. Jane Doe's secretary is Richard Roe.

    03:53 Jane Doe owns a real estate firm.

    03:56 Richard receives a short email in the afternoon that says, "Hello Richard, please pay the attached invoice." Richard, as usual, wants to download the PDF and pay the payment, until he realizes, The time is 2:30 p.m.

    04:12 However, his supervisor usually merely writes "Hello Richard" in the first email he receives in the morning. Following that, he usually only gets her orders without greeting her. He becomes skeptical and double-checks the email address.

    04:26 "jane.doe@doeporperties.com" is written on it.

    04:29 Everything appears to be in order until he finds spelling errors: properties is spelled incorrectly. This email domain was used by someone.

    04:41 They acquired a new one that appears similar, and the money would have been gone if he had moved the amount.

    04:50 The same is true for all other communication routes.

    04:54 Whether it's Skype or Slack, attackers will find a way, so be cautious.

    05:03 When you want to download something, such as a new piece of software or a program, be cautious. Please only do this on sites you are very comfortable with and that are completely secure.

    05:17 You should also be cautious when using the Internet and entering sensitive information such as passwords.

    05:23 There is a significant distinction between HTTP and HTTPS.

    05:29 When you submit data or passwords on an HTTP website, they are transmitted.

    05:35 They will be encoded with HTTPS.

    05:39 That is a significant difference.

    05:42 Maintain vigilance and a keen eye.

    05:47 Did you know I can also hack you offline? We're discussing social engineering.

    05:54 I need access to your data but don't know what password you're using.

    05:58 Some people, however, utilize a password recovery question, such as "What was the name of your first dog?" I can't Google it because I need information.

    06:11 That is difficult, so I spy on you, and lo and behold, you like to go to the bar on Wednesday evenings, and voila, the following Wednesday evening, I also go to the same bar - I sit down next to you, and at some time, I begin a conversation about dogs.

    06:28 I'll tell you about my current puppy and how well he's developing - he's just recently moved in, but we're already quite close.

    06:35 And then I'll tell you about my very first dog, Al Capone.

    06:39 "What was the name of your first dog?" I inquire.

    06:42 And you'll say, "Bello, my first dog was called Bello." I had hacked you at that point. As a result, as a human, you are the weakest link in the security chain.

    06:56 That was a brief overview of IT security - those were the fundamentals, the huge boulders. Aside from those, there are other measures.

    07:05 If you work in a huge corporation, there are rules, seminars, and training on IT security.

    07:12 If you work in a smaller organization, you may have government contact points with checklists, protocols, and so on.

    07:19 I call is that you invest time and be vigilant.

    07:22 It's very similar to insurance.

    07:24 You make payments for several years.

    07:26 Nothing ever occurs.

    07:28 Finally, you realize, "Gosh, all of that wasn't necessary." That is, of course, incorrect reasoning. If something happens, it will be too late.

    07:37 We must take proactive measures.


    About the Lecture

    The lecture Safety Measures by Frank Eilers is from the course Digital Awareness: Knowing the Risks and Preventing Them (EN).


    Included Quiz Questions

    1. Secure password
    2. Regular updates for all software
    3. Social engineering
    4. Entering data and passwords on “http://” websites

    Author of lecture Safety Measures

     Frank Eilers

    Frank Eilers


    Customer reviews

    (1)
    5,0 of 5 stars
    5 Stars
    5
    4 Stars
    0
    3 Stars
    0
    2 Stars
    0
    1  Star
    0