For Public Computers – it’s a Privacy Mat

How it works:

Step on and enter personal information (shipping address, phone number) then

Step off and the last session is instantly erased. Step back on, a new fresh form awaits.

Clever eh!  Why don’t we see more of these.

How about libraries, airport terminals, internet cafes and store loyalty program signup kiosks.

***

Spotted at Lee Valley Hardware, that store’s cool eh. I was there buying magnets, and from 2008-10 I included one of their pocket screwdrivers in my thank you cards.

 

 

3 – 6% of your IT Budget = Security

About 3 – 6% of your annaul IT budget should be allocated to security.

That’s the finding of the 2014 TELUS-Rotman IT Security Study. Which also found that spending more didn’t necessarily equate to better security. Spending less is an obviously bad idea.

Unfortuantely, the security budget is usually the first thing to get cut.  Which makes no sense, because why bother building something, if you’re not going to protect it?

Moreover, as a small business owner you have a responsibility to protect your customer’s information, especially if you’re processing credit card numbers.

How much are you currently spending?

Compare yourself to the rest of Canada:

About 30% of organizations spend the minimum, I hope you’re higher than that.

Protect your kingdom guys!

Because always remember,
it’s not IF you’re breached, it’s WHEN.

Blog tag = TELUS Security

***

This is an excerpt from my interview with Hernan Barros, Directory of Security Solutions at TELUS, and Walid Hejazi, Associate Professor, Rotman School of Management, University of Toronto, about their new study, the 2014 TELUS-Rotman IT Security Study.

More about that here.

 

 

Lock Picking Tools look like This

Set of lock picks

The L-shaped ones on the right are “torsion wrenches”. Use one of those simultaneously with one of the “picks” on the left.

A lock pick gun

It automates the above process, and while often seen in movies, it’s not that seamless.

It’s way noisier than you’d like it to be, and causes more damage to the lock than picks, leaving evidence of your presence.

(always be mindful of where you leave fingerprints.)

Spotted at SecTor 2014

 

 

The ‘Rule of Thumb’ for WiFi Range

An average router’s signal will travel:

– 150 ft inside a structure (eg. your home)
– 300 ft outside

Even if you’re living in the centre of a barren, 1,000 foot field (why are you doing that?), still password protect your WiFi (your SSID) using WPA2.

A good password looks like this:
^NKglYA%]tckcM?wG7?r6nFp!

And change your router password, because when was the last time you did.

 

 

Dispelling Fears about Car Hacking

Real brief: the problem is cars operate on the CAN bus network, which was designed in the 1980s, when the internet didn’t exist. I interviewed Chris Valasek for this.

Right now, you still need physical access to the car to hack it. For now. (I’d trying coming in via Bluetooth.)

Read it online at Autonet.

Favourite line:

That’s how car hacking works: the system doesn’t ask where the message came from or who sent it, it just accepts and executes it.

Plus the ending, because it’s true.

To attack, it’d be more efficient to roll that newspaper into a baton, than go after the target’s car.

***

All ‘Keri on Driving’ columns here.

Blog tag = auto security