Cyber-intelligence guide to protect yourself as an e ...

Cyber-intelligence guide to protect yourself as an e …

October 15, 2014

Security experts from Kaspersky Lab’s Global Research and Analysis Team have shared the security measures they use to protect their own communications via email, instant messaging tools, and smartphones while browsing across computer networks and on your interaction with the physical world.Following the example of the experts, we can see that extreme caution is justified. Security experts use non-standard phones and laptops when traveling, do not raise sensitive questions without being sure communication is well protected on both sides, and are always on the lookout for suspicious behavior around them. Now Kaspersky Lab security experts invite you to test yourself by comparing your security checklist.

Email

Contextual advertising works because you have a detailed understanding of the interests of your target audience. That’s why the companies that offer this heavily targeted advertising work closely with the big mail service providers. The mailboxes are full of valuable information about the clothes you wear, the places you want to go on vacation, and everything else you are interested in buying. The thing is, there is not a single weak point in email security: everything written in an email message can cause serious problems if you don’t think carefully about the information you are giving and the people who are viewing it. . Our security gurus recommend the following to protect yourself when using email:

· Use email encryption services for your communications · Generate a strong key for the encryption code – the longer the better · Pay attention to the metadata you are generating, even when the content of the message is encrypted. “From”, “To”, “Subject”, and shipping time, all can be tracked.

Kaspersky Lab warns: if your private key is ever compromised, all messages you have ever sent will also be compromised. Sometimes it might be safer not to use email at all.

Instant messaging

It is best not to use any commercial service that does not have an “Off the Record Messaging” (OTR) cryptographic protocol. OTR allows you to create your own private key, and encrypts all communications before sending them.

· Make sure your preferred messenger has OTR. · Activate the plug-in before starting the conversation. · Don’t forget to remind people with whom you have communication that they need to also activate OTR on their devices, otherwise your efforts they will be useless. Again, be aware of what you are saying and who is receiving this information – as they may be recording the entire conversation.

Smartphone

Your smartphone contains valuable information about your habits and your location. You probably store the same data as on your laptop and desktop, but you probably have different and even weaker security measures.

· Don’t forget to secure your mobile devices. · When you are away, whenever possible and applicable, use disposable phones.

Navigation through computer networks

· Do not accept cookies, do not allow JavaScript to run, and do not stay logged in within any account · Disable an insecure public Internet or local area network connection. Better use a 3G / 4G connection · It is better to build a safe nest by combining Tor and VPN, because even though VPN encrypts your traffic it does not provide anonymity, and Tor has several weak points of its own.

Physical world

When you’re on the go, experts suggest using a different phone and laptop than usual for those times you’re out of the office. Both devices must be kept “clean” of all kinds of confidential information. Be on the lookout for potential hardware implants and limit your laptop’s surface of potential hardware attacks. It is best not to leave any hardware unattended in the hotel room.

A true security expert is always on the lookout for his surroundings and on the lookout for suspicious patterns. They are aware of social engineering techniques and know how to deal with different situations and solve problems.

“Our fingerprint is likely to last forever, so the moment we lower our guard, for whatever reason, we run the risk of being compromised. The golden rule of cybersecurity is probably to remember that silence is a defensive discipline. The privacy of any message you send is only as good as the recipient’s security measures. But even when you cannot remain silent, you need to know how to remain discreet in the world of online information, “said Vicente Diaz, Principal Security Researcher of the Global Research and Analysis Team at Kaspersky Lab.

Even when you are not handling highly sensitive data, you can still benefit from the security guidelines that Kaspersky Lab experts have prepared for all users. Our online guide to safety facts and tips is available here: http://cybersmart.kaspersky.com/privacy

For more information on security measures, please read the blog available at Securelist.com.

[+] Videos de nuestro canal de YouTube