|
Post by Peterj on Oct 29, 2018 22:08:05 GMT
|
|
|
Post by BuckSkin on Oct 29, 2018 23:41:52 GMT
Thanks for the info, Peterj.
Not that I even pretend to know anything about it, but I did read somewhere that the least secure (home) internet connection was cable; much more secure than cable was satellite; and, the least likely to be hacked was phone-line connections, DSL I think that is called. Wireless, of course, is by far the least secure; and, public wireless is an open road.
Myself, some hacker might cause me some headaches cleaning up whatever mess they might make, but there is very little harm that they could do me personally if they had full access; I just refuse to do anything that important "online" or in my computer.
That being said, I do have our router as secure as I could make things.
|
|
|
Post by Peterj on Oct 30, 2018 0:44:47 GMT
Thanks for the info, Peterj. Not that I even pretend to know anything about it, but I did read somewhere that the least secure (home) internet connection was cable; much more secure than cable was satellite; and, the least likely to be hacked was phone-line connections, DSL I think that is called. Wireless, of course, is by far the least secure; and, public wireless is an open road. Myself, some hacker might cause me some headaches cleaning up whatever mess they might make, but there is very little harm that they could do me personally if they had full access; I just refuse to do anything that important "online" or in my computer. That being said, I do have our router as secure as I could make things. One aspect that many individuals fail to consider. Their risk is minimal because they really don't have much to steal. While that might be true if all the bad actors were looking to steal identities and the like; however larger enterprise bad guys are more interested in your computer - not to steal or destroy anything, but to mask their own activities. Once they have control of your computer they will do almost anything to keep you from discovering them. They'll use your ip connection to perform all their spying or other bad actions. Read about botnets.
|
|
|
Post by Sydney on Oct 30, 2018 21:40:34 GMT
Wow, some frightening things that hackers can do to one's computer
|
|
|
Post by Andy on Oct 31, 2018 1:39:27 GMT
Not that I even pretend to know anything about it, but I did read somewhere that the least secure (home) internet connection was cable; much more secure than cable was satellite; and, the least likely to be hacked was phone-line connections, DSL I think that is called. Wireless, of course, is by far the least secure; and, public wireless is an open road. That might apply to a situation where someone is trying to intercept your communications. That is the big issue with public wireless, for example. It is easy for someone to simply pretend to be a free wifi access point and let others connect. However, any time you have a connection to the internet, regardless of how you connect, you are susceptible to malware. Your router is your primary line of defense against that, followed by whatever security you have enabled on your individual devices.
|
|
|
Post by Bailey on Oct 31, 2018 2:34:21 GMT
Although no-one will or can give an unconditional 100% guarantee that their application, website or whatever is totally secure, imo a very important layer of computer/Internet security is Two Factor Authentication. I have it enabled on my online banking (which I only do from my home computer, never anywhere else), accounts on government related websites and Paypal account. If by some remote chance someone got hold of my username/passwords they would also need to physically have my mobile phone as well before they could do anything.
For home use, configuring your router properly is the first line of defence from hacking/spying/hijacking attempts.
|
|
|
Post by davidwilson on Nov 1, 2018 22:17:03 GMT
because the programs and sites user visit may affect your computer. In my company we had such a bad case when someone downloaded a program from unknown site and then the computer was broken after that we use SoftActivity computer software to monitor users' activity
|
|
|
Post by Andy on Nov 1, 2018 22:37:27 GMT
SoftActivity is a keylogger program and not something any of you want to install on your home computers.
|
|
|
Post by whippet on Nov 2, 2018 20:40:52 GMT
Bailey mentions - Two Factor Authentication.
I have done a search, but can only find sites which are directed to businesses.
Is there anywhere for the average computer user to go, to get this cover?
I have a phone line connection
|
|
|
Post by Andy on Nov 2, 2018 21:09:49 GMT
At the request of the OP, I've moved the issue with the Office Suite for Mac to a new thread (along with two subsequent posts).
|
|
|
Post by Andy on Nov 2, 2018 21:12:30 GMT
Bailey mentions - Two Factor Authentication. I have done a search, but can only find sites which are directed to businesses. Is there anywhere for the average computer user to go, to get this cover? I have a phone line connection Two-factor authentication is great, but it is different for each site/service you use (banks, Twitter, Facebook, Microsoft, Google, etc. etc.). You have to go into your security settings for each of those services and enable it. It takes work, but it is worth it - especially for critical items like online banking or other financial sites.
|
|
|
Post by Bailey on Nov 2, 2018 21:43:31 GMT
Bailey mentions - Two Factor Authentication. I have done a search, but can only find sites which are directed to businesses. Is there anywhere for the average computer user to go, to get this cover? I have a phone line connection Two-factor authentication is great, but it is different for each site/service you use (banks, Twitter, Facebook, Microsoft, Google, etc. etc.). You have to go into your security settings for each of those services and enable it. It takes work, but it is worth it - especially for critical items like online banking or other financial sites.
Yes it takes a bit of work, but in my experiences it is minimal.
The general process I have encountered when switching on TFA is:
1. Enable it in the Settings of the web application/site.
2. After registering my mobile phone number in the Settings, it immediately sends a string of numbers to my phone to confirm the phone number and waits for my response.
3. I then enter the string of numbers received as an sms on my phone in the Settings page and my TFA is then registered and activated.
The next time I log into the web site, after entering my username/password a string of numbers is sent to my phone. I have to enter that string of numbers into the login page before it will log me on.
|
|
|
Post by Peterj on Nov 2, 2018 23:33:50 GMT
Two-factor authentication is great, but it is different for each site/service you use (banks, Twitter, Facebook, Microsoft, Google, etc. etc.). You have to go into your security settings for each of those services and enable it. It takes work, but it is worth it - especially for critical items like online banking or other financial sites.
Yes it takes a bit of work, but in my experiences it is minimal.
The general process I have encountered when switching on TFA is:
1. Enable it in the Settings of the web application/site.
2. After registering my mobile phone number in the Settings, it immediately sends a string of numbers to my phone to confirm the phone number and waits for my response.
3. I then enter the string of numbers received as an sms on my phone in the Settings page and my TFA is then registered and activated.
The next time I log into the web site, after entering my username/password a string of numbers is sent to my phone. I have to enter that string of numbers into the login page before it will log me on.
I encourage all to use two factor authentication (TFA) where possible. However TFA is only one piece of security and privacy; router, firewall, antivirus, and keeping software and OS updated are also extremely important.
I consider safe computing an endless journey ... certainly not a destination.
|
|
|
Post by Andy on Nov 3, 2018 19:35:31 GMT
Two-factor authentication using your phone is also not as safe as using it through an application (Google and Microsoft both have free TFA apps). It isn't that hard for someone to compromise your phone if they so choose. My general attitude is that having any TFA is like having a car alarm - it doesn't mean your car can't be stolen, but it makes it a whole lot more work than going after the car that doesn't have the alarm.
|
|
|
Post by Peterj on Nov 3, 2018 20:02:15 GMT
Two-factor authentication using your phone is also not as safe as using it through an application (Google and Microsoft both have free TFA apps). It isn't that hard for someone to compromise your phone if they so choose. My general attitude is that having any TFA is like having a car alarm - it doesn't mean your car can't be stolen, but it makes it a whole lot more work than going after the car that doesn't have the alarm. My take on computer security - There no such thing as a 100% secure computer that's functional ... all we're doing is playing the time game ... the more impediments in front of a pc the longer it will take for a bad actor to get in; make the time long enough they'll move on.
In the corporate world an often ignored security aspect is physical security - if a bad actor has physical access they own the computer! For home computing this is marginally important.
|
|