A few system and lifestyle changes will better protect you, your data, and your system in 2013 Happy New Year world! Like many of my fellow bloggers and analysts, I’ll have my own set of security predictions for 2013 soon. One thing I can easily surmise however is that cybersecurity will become more dangerous and more sophisticated this year just as it has in the past. I realize that most people focus their new year’s resolutions on weight loss, exercise, or money management but I firmly recommend a few cybersecurity improvements as well. Here is a shortlist of some quick fixes and lifestyle changes that can help you better protect your system, identity, and other valuable data in 2013. 1. Change your passwords. There’s lots of research to indicate that most people use simple passwords or choose one strong password and use it all the time. Neither one of these practices is safe. As you access your on-line accounts this January, change every password, use a string of 7-10 characters, and make each one unique. Henceforth, repeat this process often depending upon the value of the account. While this is a good best practice, don’t believe for a second that you are protected as the whole user name/password model is extremely vulnerable and due for some type of replacement. See this excellent Wired magazine article (http://www.empowernetwork.com/earthgrid/blog/wired-magazine-password-mat-honan-hacked/) for more details on why passwords are the cybersecurity equivalent of bringing a knife to a gun fight. 2. Change your security software settings. I’m assuming you are running Internet security software on your system. If so, go into the system settings and check your protection level. In many cases, security software provides three options (low, medium, and high), with medium being the default. Change this setting to high or whatever other label your security software vendor uses for maximum protection. Many people believe that this maximum setting will slow system performance but if your PC is 2 years old or newer, you shouldn’t notice a difference. 3. Explore other software security options. I’ve found that most users really never look at the capabilities built into their Internet security software. This is a crying shame and it leaves users far more vulnerable than they could be. Security software from vendors like Kaspersky Lab, McAfee, Symantec, and Trend Micro (amongst others) have built-in features for things like proactive defense, password management/storage, virtual keyboards, automated malware quarantine, etc. Take the time to see what options are available and start using those that will enhance protection without getting in your way.4. Delete old software. PCs, smart phones, and tablets are just about the only things we buy that come loaded with stuff we don’t want and will never use. Most people just ignore this garbage on their systems but stale software could be vulnerable to an attack. Take the time to get rid of it. 5. Manage the Windows white flag. If you are using Windows 7 (and perhaps Vista though I’m not sure), there is a little white flag icon on the bottom right of your system. When you mouse over it, it says, ‘solve PC issues.’ When you see this flag, take the time to remediate these problems. It’s not there by accident.6. Explore system utilities and security add-ons. In addition to seeing what features you already have in your security software, you may want to add some additional capabilities. For example, registry cleaners can help detect rogue registry settings that may indicate the presence of malware. Note that they won’t clean up the malware but they may delete a registry key that the malware depends upon. You may also want to look at browser sandboxing tools and evaluate some Advanced Malware Detection/Prevention (AMD/P) endpoint security tools from vendors like Invincea, Malwarebytes, and Sourcefire. These tools are generally used in work environments but some vendors offer consumer versions as well.A good friend of mine thinks of the Internet in the same way he used to think of the old Combat Zone here in Boston. Before it was cleaned up, this was the area of Boston known for adult entertainment, dive bars, and seedy individuals. You visited the Combat Zone at your own risk knowing there was always the potential to get ripped off or mugged.Just like the Combat Zone of the 1980s, you need to be prepared for the risks you face every time you go on-line. These tips won’t guarantee your safety but they will certainly improve your protection. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe