Notice: Undefined index: panels_info in /var/www/tedstechshack.com/wp-content/plugins/siteorigin-panels/siteorigin-panels.php on line 382

Notice: Undefined index: panels_info in /var/www/tedstechshack.com/wp-content/plugins/siteorigin-panels/siteorigin-panels.php on line 382

Notice: Undefined index: panels_info in /var/www/tedstechshack.com/wp-content/plugins/siteorigin-panels/siteorigin-panels.php on line 382

Notice: Undefined index: panels_info in /var/www/tedstechshack.com/wp-content/plugins/siteorigin-panels/siteorigin-panels.php on line 382

Notice: Undefined index: panels_info in /var/www/tedstechshack.com/wp-content/plugins/siteorigin-panels/siteorigin-panels.php on line 382

Notice: Undefined index: panels_info in /var/www/tedstechshack.com/wp-content/plugins/siteorigin-panels/siteorigin-panels.php on line 382

Notice: Undefined index: panels_info in /var/www/tedstechshack.com/wp-content/plugins/siteorigin-panels/siteorigin-panels.php on line 382

Notice: Undefined index: panels_info in /var/www/tedstechshack.com/wp-content/plugins/siteorigin-panels/siteorigin-panels.php on line 382
{"id":98,"date":"2014-11-05T16:08:51","date_gmt":"2014-11-05T16:08:51","guid":{"rendered":"http:\/\/tedstechshack.com\/?p=98"},"modified":"2014-11-15T19:56:23","modified_gmt":"2014-11-15T19:56:23","slug":"data-data-everywhere","status":"publish","type":"post","link":"https:\/\/tedstechshack.com\/2014\/11\/05\/data-data-everywhere\/","title":{"rendered":"Data, Data, Everywhere"},"content":{"rendered":"

When organizations like the White House and JP Morgan can not keep their data safe, how in the world are small businesses and individuals supposed to keep their information safe?<\/p>\n

Computer Security has become a large field with many aspects. \u00a0There is an old saying in Computer Security; the absolutely secure computer is the completely unusable one. \u00a0The goal of the computer security specialist is to figure out a balance between usability and security.<\/p>\n

An organization such as an international bank might have very tight security. \u00a0For example, to access the primary encryption key for a bank will probably involve a lot of physical security coupled with social security. \u00a0You might need two or more senior management to open a secure vault and retrieve their portion of a key. \u00a0All of this will be done on camera, with a team of technicians, management, and security. \u00a0Often these keys are stored within vaults within vaults. \u00a0Many contain man traps. \u00a0Oh, the poor techie who wakes up on the floor after being gassed because he didn't get the codes entered in proper sequence.<\/p>\n<\/div><\/div><\/div>

<\/div><\/div>

As a system becomes more secure, it becomes increasingly hard to use.<\/p>\n<\/div><\/div><\/div><\/div>

Obviously a system like this is very secure, and sounds like something out of a James Bond movie, but something as simple as generating a new SSL certificate can take weeks of planning and dozens of people. \u00a0Secure, but not very usable.<\/p>\n

High value targets are banks, government, defense, infrastructure, e-commerce, etc. \u00a0But monetary gain isn't the only motive behind theft. \u00a0Some folks do it for the glory. \u00a0In some of the recent celebrity private photo thefts the cracker asked for donations but reportedly received very little Bitcoin. \u00a0The celebrity photo thefts employed mostly social hacking and is an example of what is likely to happen to most common users.<\/p>\n

But what if someone destroys your family photos? \u00a0Some crackers have been known to break into your system and then hold your data hostage until you pay a ransom. \u00a0 This is where Disaster Recovery can save the day.<\/p>\n

For most of us what we really need is to keep our financials safe. \u00a0Sure, it can be embarrassing when someone breaks into our Facebook account, and even dangerous. \u00a0I know of more than one case where someone has had their Facebook account jacked and the cracker contacted their friends trying to get money. \u00a0There are a few things you can do to try and protect yourself.<\/p>\n

First use strong passwords. \u00a0These are generally considered to be 8-12 characters in length and a mix of upper and lower case letters, with some numbers and punctuation symbols thrown in. \u00a0Passwords should never contain words that one might find in a dictionary. \u00a0While a password like \";3R[atOHnX1^\"<\/em> might be secure it is nearly impossible to memorize and hard to type in. \u00a0This is where password managers can come into play. \u00a0It is vitally important that your master password list be safe and secure. \u00a0If you lose it not only will all your accounts be compromised, but you might not even be able to access them!<\/p>\n

Never use the same password across multiple accounts. \u00a0If a website is cracked and their password lists stolen, a cracker will often try the account credentials on multiple websites.<\/p>\n

Use two factor authentication when it is available. \u00a0More and more providers are enabling two factor authentication. \u00a0Having a physical \"key<\/em>\" that is required to access your accounts increases your security significantly. \u00a0But even two factor authentication can be cracked, remember the only completely secure computer is the completely unusable one.<\/p>\n

With data everywhere these days, everyone needs to understand at least the basics of Computer Security as it applies to them. \u00a0I'm happy to help train, explain, and setup a system that works for you.<\/p>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"

When organizations like the White House and JP Morgan can not keep their data safe, how in the world are small businesses and individuals supposed to keep their information safe? Computer Security has become a large field with many aspects. \u00a0There is an old saying in Computer Security; the absolutely secure computer is the completely […]<\/p>\n","protected":false},"author":1,"featured_media":99,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":""},"categories":[4],"tags":[],"jetpack_featured_media_url":"https:\/\/tedstechshack.com\/wp-content\/uploads\/2014\/11\/data-through-tubes-via-niem-1347044649.jpg","jetpack_publicize_connections":[],"yoast_head":"\nData, Data, Everywhere - Ted's Tech Shack<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tedstechshack.com\/2014\/11\/05\/data-data-everywhere\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data, Data, Everywhere - Ted's Tech Shack\" \/>\n<meta property=\"og:description\" content=\"When organizations like the White House and JP Morgan can not keep their data safe, how in the world are small businesses and individuals supposed to keep their information safe? Computer Security has become a large field with many aspects. \u00a0There is an old saying in Computer Security; the absolutely secure computer is the completely […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tedstechshack.com\/2014\/11\/05\/data-data-everywhere\/\" \/>\n<meta property=\"og:site_name\" content=\"Ted's Tech Shack\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tedstechshack\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/tedstechshack\" \/>\n<meta property=\"article:published_time\" content=\"2014-11-05T16:08:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-11-15T19:56:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tedstechshack.com\/wp-content\/uploads\/2014\/11\/data-through-tubes-via-niem-1347044649.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tedstechshack.com\/#website\",\"url\":\"https:\/\/tedstechshack.com\/\",\"name\":\"Ted's Tech Shack\",\"description\":\"Solving your technology needs!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/tedstechshack.com\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/tedstechshack.com\/2014\/11\/05\/data-data-everywhere\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/tedstechshack.com\/wp-content\/uploads\/2014\/11\/data-through-tubes-via-niem-1347044649.jpg\",\"width\":640,\"height\":360},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tedstechshack.com\/2014\/11\/05\/data-data-everywhere\/#webpage\",\"url\":\"https:\/\/tedstechshack.com\/2014\/11\/05\/data-data-everywhere\/\",\"name\":\"Data, Data, Everywhere - Ted's Tech Shack\",\"isPartOf\":{\"@id\":\"https:\/\/tedstechshack.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tedstechshack.com\/2014\/11\/05\/data-data-everywhere\/#primaryimage\"},\"datePublished\":\"2014-11-05T16:08:51+00:00\",\"dateModified\":\"2014-11-15T19:56:23+00:00\",\"author\":{\"@id\":\"https:\/\/tedstechshack.com\/#\/schema\/person\/fd220ee0fee205cc1f2f3658953bfef5\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tedstechshack.com\/2014\/11\/05\/data-data-everywhere\/\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/tedstechshack.com\/#\/schema\/person\/fd220ee0fee205cc1f2f3658953bfef5\",\"name\":\"Ted Parvu\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/tedstechshack.com\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/04344bf248172739a95607c68db267dc?s=96&d=retro&r=pg\",\"caption\":\"Ted Parvu\"},\"description\":\"My hacking career began at age 12, when my father brought home a Sinclair ZX-81 computer kit and a lifelong fascination with computing was born. I became a privacy and security advocate after learning of the US Government's criminal investigation against Phil Zimmermann. Years later I found myself in Silicon Valley being paid to hack Phil's PGP code. I soon tired of the rat race and moved to the Northwoods of Minnesota where I have over 2 million acres of protected wilderness to roam. Here I indulge in my passions for wilderness and technology and as an advocate for computer security and privacy.\",\"sameAs\":[\"https:\/\/www.facebook.com\/tedstechshack\",\"https:\/\/www.linkedin.com\/pub\/ted-parvu\/41\/b22\/25\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p5bhup-1A","_links":{"self":[{"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/posts\/98"}],"collection":[{"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/comments?post=98"}],"version-history":[{"count":3,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/posts\/98\/revisions"}],"predecessor-version":[{"id":220,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/posts\/98\/revisions\/220"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/media\/99"}],"wp:attachment":[{"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/media?parent=98"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/categories?post=98"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tedstechshack.com\/wp-json\/wp\/v2\/tags?post=98"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}