7 DON’Ts for Your Computer Security

Author Archive for Della Wyler – Page 7

7 DON’Ts for Your Computer Security

We have recently written several articles revolving around cyber-, IT and computer security. While certain aspects of these topics are more complex (you can find information on further training and certifications we provide here), here are a few simple things to keep in mind, some DON’Ts as in things that you should better not do – or at least think twice about before doing so – to avoid risking your computer’s and personal information’s integrity and security.

Ways to Protect Your Information- Even Before Training and Certifications

Saving passwords on shared devices

Don’t save any passwords or PINs (Personal Identification Numbers) that grant access to your profiles and accounts on any computer devices that you share with others or that might potentially be shared with others, for example:

  • Office computers
  • Computers at internet cafés, public libraries or
  • any kind of public computer terminals

Staying logged in on shared devices

Don’t leave the above mentioned computers without first logging out of your accounts and closing your browser tabs. (The very least you should do when leaving your office computer unattended, is using a password-protected lock-screen.) For added security, you might even want to delete your browsing history.

Leaving mobile devices unattended

That one should really be a “no-brainer”: Don’t leave your mobile devices unattended. Not only are you risking unauthorized access by other people – you are risking THEFT of the device (laptop, tablet, smartphone).

Staying on outdated operating systems/internet browsers

Don’t ignore security patches and updates for your software, especially when it comes to your operating systems and internet browsers: Many software providers frequently provide updates and patches for their products, and for a good reason. Outdated operating systems, internet browsers etc. can make you more vulnerable to malware, hacking attacks etc. (Needless to say: If you do your updates manually, make sure you are getting them from their genuine source.)

Clicking on unknown attachments

Don’t blindly click on email attachments if you don’t know or have not verified the sender. This especially refers to (but is NOT limited to) .exe and .zip files, since those formats are more likely to contain malware.

Trusting potential phishing emails that want you to “verify your account”

They might claim to come from one of your providers or even banks, and they might ask you to click on a given link to re-enter your log-in details. Make very sure that the email actually does come from the sender it claims to be coming from. Be suspicious, and when in any doubt, go to your already familiar provider’s home to log into your account and see if you are prompted to verify or change any personal information.

Storing of login information next to your computer

Don’t leave notes with your login information with your computer (i.e. on your desk, under the monitor, in your laptop case etc.)

 

 

https://its.ucsc.edu/security/top10.html

https://www.consumer.ftc.gov/articles/0009-computer-security

https://www.consumer.ftc.gov/articles/0015-laptop-security

https://its.ucsc.edu/security/training/docs/intro.pdf

 

 

Safety and Security Measures You Should Follow

Security is important, especially with computers, internet, and personal information.  Here’s a few cybersecurity tips to keep yourself safe.

Follow These Cybersecurity Tips for Safe Computer Access

Make use of passwords and PINs

Your passwords and PINs are an imperative line of defense, not only for your devices, but especially for your online “existence” – your social media profiles, online-shop accounts and access to your online-banking.

In other words: When your device offers you the option to use are protective password or PIN (personal identification number) in order to access it, then do make use of it. (The access to your various online profiles is usually password-protected as a rule, anyway.)

Avoid easy guesses

Don’t use PINs like 1234 or your birthday – those are combinations that other people often try first to get unauthorized access.

The same goes for passwords: Neither your own name, nor your partner’s or your children’s names are a difficult leap – and would-be hackers know that, too – so it’s better if you stay clear of such password choices.

Make your passwords more complex (and therefore more difficult to guess or hack) by making them at least eight digits and a combination of letters, numbers, and where applicable, even symbols. When you set up an online-profile, the provider often gives you a guideline regarding the minimum security requirements for your password choice.

Don’t use the same password every time

Make sure not to use the same password all over your various accounts, especially not in combination with the same username or email-address. The reason is a simple one: In case one of your accounts should get hacked after all, you don’t want the hackers to have access to your other accounts as well!

Keep changing your passwords periodically

For similar reasons, it is a good idea to change a once determined password after a while, so that even if your account had been compromised at one point, maybe without your noticing, the hacked password will not work for unauthorized people’s future use.

Organize your passwords and keep them safe

It’s obvious that all these different passwords and user names need some organization as well as safekeeping. You might want to write them down somewhere, but if you do, keep them away from open display and if possible not in direct vicinity to your computer. One way to do this electronically is using a special password-manager software (that can even create unique and elaborate passwords for you).

Make sure to log out of your accounts when you leave, especially on computers that are not yours

Many online-shops provide the option to stay logged in your profile with them, so that you are not automatically logged-out once you check out and leave the shop. This is usually done by checking a little box where you log into your account (e.g. “Keep me signed in”).

While this can be a handy little option to use on your personal device in order to do some quick shopping without having to go through the log-in process, you should definitely not use this option on a public computer, or any computer that other people might have access to. This is one of the basic steps to protect your profiles and accounts – so basic, that the providers of this option usually expressly advise against staying logged-in themselves.

 

Sources:

https://fieldguide.gizmodo.com/18-ways-to-make-your-online-accounts-more-secure-1793250264

https://support.google.com/accounts/answer/32040?hl=en

https://www.consumerreports.org/digital-security/everything-you-need-to-know-about-password-managers/

 

 

Obtaining a Degree in Cybersecurity

So you are interested in computers and information technology, maybe you even have been working in an IT job for a while. One way or the other, sooner or later you will encounter the subject of “Cybersecurity” (or rather “cybersecurity”). That can be considered a rather natural progression because once you start creating, storing working with digital information, you are going to want to protect it against access from any unauthorized party.

A Cybersecurity Degree Can Keep You and Your Clients Protected

Maybe you have even become that interested that you want to specialize in the cybersecurity field, maybe even make a career of it.  A cybersecurity degree can help you do that.

 

So, what exactly is Cybersecurity?

 

The Merriam-Webster dictionary explains cybersecurity with “measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack”.

 

Since a great part of today’s world is being organized via computer systems, experts to protect their security are in high demand, be it in the private or governmental sector. (We will discuss your actual cybersecurity career chances in one of our next posts.)

 

How to become an expert in cybersecurity

 

Cybersecurity specialists often get their expertise from various sources – one being a well-rounded experience in the general IT field, the other, frequent one specialized certification courses that deal with the various aspects of computer/IT/cybersecurity.

 

While a college or university degree in cybersecurity is not necessarily a requirement to become a cybersecurity professional, you might want to consider getting a degree in this area – either because you prefer the academic environment and approach, you want to set yourself apart from the competition, our you simply want to further your education and skill set.

 

Cybersecurity and higher education/academics

 

There are various university/college programs (undergraduate/graduate as well as postgraduate) that provide a degree in the area of cybersecurity, even if they might not always be named thus. Apart from Cybersecurity, you might come across terms like “Digital Forensic Science” and “Information Security Operations” as well as simply “Computer Science”. You can find programs like these at university and colleges all over the United States (including the Ivy League). True to the nature of their subject, some of these programs can be done online instead of (or in addition to) studying on-campus.

 

Websites like CyberDegrees.org, BestColleges.com or CollegeChoice.com offer an overview as well as further information about which program and school might be the right choice for you.

 

 

 

Sources:

 

https://www.cyberdegrees.org/listings/

https://www.bestcolleges.com/features/top-online-bachelors-in-cybersecurity/

https://www.collegechoice.net/rankings/best-online-cybersecurity-degrees/

https://techsherpas.com/public-training-schedule/

Take a few simple steps to earn an MCSA/MCSE Cloud Platform & Infrastructure Microsoft Certifications

Certified IT professionals, now more than ever, are being sought out by corporations to ensure they get qualified individuals to run their organizations more efficiently. The streamlined Microsoft Certifications were created with job roles in mind. Depending on the role an IT professional will have, there are certification pathways in place to get them the skills sets and qualifications they will need to fill their role.

Here, we will breakdown the Cloud Platform and Infrastructure certification tracks. There are four pathways to earn the MCSA, which is the first step in earning the MCSE.

 Microsoft Cloud Platform & Infrastructure Certification Pathway

  Microsoft Certifications:

  • MCSA Windows Server 2012,
  • MCSA Windows Server 2016
  • MCSA Linux on Azure (including LFCS)
  • MCSA Cloud Platform
  • MCSE Cloud Platform & Infrastructure

Earning an MCSA requires you to take 2-3 courses/exams (depending on the certificate you are going for). Once you have earned any of the MCSA’s listed above, you only need to take 1 elective course/exam to earn the MCSE.

Target job roles:

  • MCSA level: Cloud administrator, network or computer systems administrator, computer network specialist, cloud specialist in Linux
  • MCSE level: Senior cloud administrator, cloud architect, cloud engineer in Linux, computer support specialist, information security analyst

You can earn an MCSA by taking a bootcamp, or purchasing a bundle. There are Live instructor-led options as well as On-Demand options – all created with you in mind, so there is something to fit every budget and schedule. Sign up today! Get certified!

Boot Camps

Bundles

  • MCSA: Cloud Platform / MCSE: Cloud Platform & Infrastructure
  • MCSA: Linux on Azure / MCSE: Cloud Platform & Infrastructure
  • MCSA: Windows Server 2016 / MCSE: Cloud Platform & Infrastructure

Have questions? Feel free to reach out to us! Our team is ready to guide you towards the right path to fit your learning goals, budget, and schedule.

 

The Difference between Cybersecurity, Information Security and Computer Security

First things first: cybersecurity and IT security (information security) are not precisely the same thing, even though many people tend to use these terms interchangeably – which is understandable, because they are very closely related. In general, they both refer to the world of computers, computer networks and the information that is stored and processed there. This information is often highly sensitive and therefore, of course, needs to be protected by various measures.

Security for IT Professionals Explained

Security for IT professionals is a complicated matter, so here’s a basic explanation of the main types of security.

Simply put, one could probably say that “cybersecurity” (or according to the Merriam-Webster dictionary “cybersecurity”) aims at protecting the computer and/or computer network or computer system (which of course includes access via the internet as well), while “information security” or “IT security”, as the expression might suggest, concentrates on the protection of the data within those computers/computer networks.

Almost the same – but not quite the same

Of course, one could argue that the reason for protecting “the computer(s)” as such is the protection of the data/information, one way or the other.

According to the Glossary of Key Information Security Terms from May 2013 that is published by the National Institute of Standards and Technology (NIST), Cybersecurity refers to the “ability to protect or defend the use of cyberspace from cyber attacks” (CNSSI-4009)

According to Merriam-Webster, Cybersecurity is defined as “measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack”.

On the website of “The School of Business at George Mason University”, one can read the following definition: “protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability”.

This might sound/read rather similar, but this time, the definition happens to refer to the term of Information Security. So, how can that be? Is it simply a question of semantics?

Actually, there is a slight difference between those two definitions: The second one focuses on the protection of the information.

Two aspects of the same challenge

Does this still sound quite the same? That’s because in both cases, the eventual challenge is the same. But the focus of the protective measures is slightly different – just like there is a difference between a watchdog and/or security guard securing the entrance to a building and the bodyguard that might protect a person that lives inside.

Back to the world of computers, one could probably argue that Cybersecurity and Information Security are two aspects of the same challenge – Computer Security or “COMPUSEC”, defined by NIST as: “Measures and controls that ensure confidentiality, integrity, and availability of information system assets including hardware, software, firmware, and information being processed, stored, and communicated.” (CNSSI-4009)

Collaboration Via OneNote

Microsoft OneNote is much more than just a convenient note-taking app – especially once you know how to get the best use out of it.

Collaboration is Made Possible with One Note

Therefore, this is a short overview of the various things you can do within Microsoft OneNote, and how to put them to good use for collaboration purposes with other people (even whole teams).

OneNote allows you to create virtual notebooks and to subdivide these into sections, pages, and sub-pages. The app includes (depending on the version you are using) different functionalities already known from the Microsoft Office package:

General Functions of One Note

Text:

  • Create, format and edit texts
  • Use templates to create various kinds of document styles
  • Create and check-off task lists

Tables/Spreadsheets:

  • Create tables/spreadsheets within OneNote and also convert them into the Microsoft Excel format
  • Import tables from Excel

Graphics, Images, Design:

  • Include and arrange graphics and images (e.g. screenshots, photos)
  • Draw free-hand

Multimedia:

The functionalities may vary depending on your OneNote version.

  • Record and embed audio and video files
  • Link to and/or embed Youtube videos)
  • Embed/insert files in various formats

These functions allow you to collect, arrange and organize information from various sources and in various formats. You can do so on your computer, within your internet browser as well as on your mobile device, and you can easily synchronize your entries via internet access across your different devices (either automatically or manually) as well as with the people you select to share the respective notebook with.

 

Collaboration Methods:

The function that makes OneNote so useful for collaboration purposes is the possibility of sharing one or several of your notebooks with other users, and to determine whether they are merely granted viewing rights or can edit the shared content as well.

Thus it allows several users to compile and view collected information in one place, and to jointly work on text drafts (editing, annotations), check-off to-do lists etc.

When a user makes changes on a page, it synchronizes in almost real-time, and the recent changes appear on the other users’ devices marked with a different color to indicate them as changes done by someone other than oneself.

Your OneNote is connected to your Microsoft account, and you can access OneNote either via the respective mobile app or computer software (which can be downloaded from Microsoft and comes already preinstalled with Windows 10). You can also access it online via your internet browser: https://onedrive.live.com

 

 

https://products.office.com/en-US/onenote

https://support.office.com/en-us/article/Share-a-OneNote-2016-for-Windows-notebook-with-other-people-d14b6033-7a95-4536-9216-bb0a5e0f8285

https://www.digitaltrends.com/computing/a-guide-to-microsoft-onenote-on-windows-10/

https://onedrive.live.com

 

What is Microsoft R and What Does it Do?

If you are not familiar with programming and programming languages, the mention of “Microsoft R” might not mean that much to you.  So, what is Microsoft R?

For those interested in the subjects of statistical computing, data science, and analytics, the “Microsoft R Client” combines two well-known and very well-established components.

What Is Microsoft R and What Does It Do for Your Client?

The R language (based on the S Language for Statistical Computing that originates in the 1970ies) has already been around for quite some time, having been first implemented in the 1990ies by two faculty members of the University auf Auckland: Robert Gentleman and Ross Ihaka. In 1995, R was established as an open source product, which is meanwhile managed be the R Core Group/R Core Team.

First steps to work with the Microsoft R Client

  1. You start with downloading and installing the right version for your operating system – it is compatible with Windows, Linux (Redhat 6 and 7, SLES 11, Ubuntu 14.04 and 16.04), and works with the Machine Learning Server & R Server. You can download for free here:
  2. Configure your IDE (integrated development environment)

You can find more detailed information regarding the installation and configuration process, system requirements etc. here (Windows) and here (Linux).

TechSherpas Course 20773: “Analyzing Big Data with Microsoft R”

TechSherpas offers you a comprehensive course on how to make the best use of Microsoft R to analyze your large data sets within a big data environment. It also helps developers regarding the integration of R analyses into their respective solutions.

In order to get the most out of this course, as a student you should be familiar with

  • R and how to utilize it for programming
  • Common statistical methods
  • Microsoft Windows
  • Relational databases

MCSA Machine Learning Bundle for Certification

The Techsherpas MCSA learning Bundle combines the above “Analyzing Big Data with Microsoft R” with 20774: “Perform Cloud Data Science with Azure Machine Learning”

Depending on whether you like the live classroom experience at one of our locations all over the United States or prefer learning in a virtual environment, you can choose between two options: In-Classroom Learning (ICL) Virtual Live Training (VLT). These classes take place about once a month, and you can choose between various local events from A as in “Anchorage” to V as in “Virginia Beach”.

Customized Onsite-Training

If you need the training for a whole group (for example a team of employees), we offer individually customized training solutions at a location of your choice. Please contact us with your questions, and for further information.

Sources:

https://docs.microsoft.com

 

The Value of CompTia Training

Not all IT certifications are created equal. Anyone who teaches anything can theoretically issue a certificate when their students have successfully attended whichever course had been created. Therefore, the worth of a certificate depends at least partially on the reputation and credentials of the person/organization/entity that has issued it.

CompTIA Certifications Can Bring You Further in Your Career

So, whether you are a freelancer or looking for employment: If you want to get ahead in your chosen career field, it helps to not only study and train in order to achieve the necessary skills but to get officially certified in order to reflect this. You also want the certification to be

  • done by a reputable source
  • with a high recognition value
  • vendor-neutral

These criteria – among other benefits – are all met by:

CompTIA – The Computing Technology Industry Association

CompTIA certifications rank among the information technology industry’s leading trade associations and issues vendor-neutral professional certification on for different levels – from entry- to expert-level. They are well established, having developed their own IT certification series as early as the 1990ies, and they are well-known by those people you want to review your credentials: future employers and clients.

They also know what kind of skill-set they can expect from a CompTIA certified candidate, which provides a sense of security when it comes to identifying the right people for the job.

Information Technologies – CompTIA Education, Training and Certification

When choosing CompTIA or a member of their CompTIA Authorized Partner Program, people interested in computer and IT have various options to develop and enhance their knowledge.

CompTIA certification covers the basics as well as various specialized, advanced options

  • IT Fundamentals
  • A+
  • Network+
  • Security+

The best choice of these options depend on whether the specialized interests/career plans lie more in the areas of IT infrastructure

  • Linux+
  • Server+
  • Cloud+

or cyber security

  • CySA+
  • CASP

There is also a selection of additional certificates in the areas of:

  • Project+
  • Cloud Essentials
  • CTT+

This means, that your set of IT-related skills, as well as your career path, can evolve by following a system of certificates that are built upon one another and provide you with a well-rounded IT education and corresponding advanced career chances.

It is not all about computer networks: With CompTIA alumni, there is also the opportunity for networking and staying connected outside the actual certification process – another important factor for IT specialists on their career path. There is even the possibility of opting for a career within the CompTIA team as such, by becoming one of their so-called “Subject Matter Experts” (SMEs).

CompTIA Certification Expiration

Another benefit of the CompTIA certifications, at least from an employer’s point of view:

While previously issued CompTIA certificates did not expire, they (i.e. those issued since 2011) meanwhile have an expiration time of three years and therefore need to be renewed after three years (or need a certain amount of documented practice/continued education that counts towards the certification renewal).

This ensures, that the individuals with these certificates stay up-to-date with their respective IT skills – something that is of particular importance in the area of computers and information technology – a field which is constantly and rapidly evolving.

 

 

https://techsherpas.com/technology/comptia/

https://certification.comptia.org/

https://www.comptia.org/about-us/our-story/certification

https://certification.comptia.org/certifications/which-certification

https://en.wikipedia.org/wiki/CompTIA

 

Blogs to Follow if You’re Tech Career Bound

So you are interested in a career in the technology field – that’s great! Since technology is a quickly changing area, it is important to not only be informed but to STAY informed in order to keep up with the latest developments.

Headed for a Career in the Technology Field?  Read These Blogs!

Technology blogs are a great way to stay current and to

  • keep up-to-date with the tech world and its latest developments in general
  • enhance/acquire specialized knowledge in the niche/field of expertise
  • engage with other technology-interested people

One of the criteria for the right tech blogs is of course also the question how advanced/specialized your knowledge already is, and what kind of profession/job you envision for yourself in the technology area.

  • Maybe you want to simply make sure that you do not miss out on the latest developments?
  • Do you already have the basic knowledge and are now looking for more in-depth information, or are you already out there with the experts and want to use the blogs not only for acquiring further expert knowledge but also for networking via discussions in the comments section?
  • Are you more interested in the academic and educational aspects of the technology world, or is it the practical use and application?
  • Or are you currently focused on the actual tech career aspects – finding the right college or employer, getting an idea about the current job market and evaluating your options?

To make things easier – and to get started, here is a selection of tech-related (and tech education-related) blogs. Consider it a menu, and take your pick among the different sections:

General Tech Blogs, News, Reviews, and Entertainment

General tech blogs are a good way to get a general overview with what is going on in the world of technology. They can also be great resources to get tips for further reading.

Leading Tech Companies

When you are looking for a tech-related career, the idea of keeping an eye on what is going on at the major tech companies is not a great leap of thought: You get first-hand information on their products, and in case of a job interview with one of these companies you can show your in-depth knowledge and genuine interest.

University Life and Education

Careers and Job Market

Technology for Teachers/Educators

Which blog will you check out?  Let us know in the comments below!

How Remote Learning Can Change Your Life

Be it a college course, the learning of a foreign language or software coding – you can learn a multitude of things remotely, i.e. via the internet. There is hardly a subject on which you cannot find information and instruction, be it in the formal setting of a university online platform, tutorials and “how-tos” on private and business websites as well as the major video platforms.

Remote Education Can Change Your Life Forever

This means you cannot only learn how to knit, crochet or cook with the help of videos and graphics – certain accredited online programs also allow you to achieve a high school or even a college degree while studying from home.

Higher education:

  • Study according to your own schedule and pace, even while being fully employed or being at home raising your kids
  • Save on expenses for commute and campus housing etc.
  • Study independently from your current location by utilizing mobile devices like laptops, tablet computers or even smartphones

Since your level of education usually plays a huge part when it comes to your general chances of employment and/or getting ahead in your career, furthering your education through remote learning could literally be a way of changing your life.

Learn new skills, boost your CV/career:

It does not always need to be a formal school/college education that you decide on. Computer-based remote learning can also help you to keep up-to-date with your software-, multimedia- and internet-skills. You might do that out of personal interest, but of course, such skills might further your career as well.  They can even help you to become self-employed if that is your goal.

Enrich your life/leisure time in general:

Of course, work is not everything. Maybe, in contrast, you are looking for a new hobby to balance your busy work day: arts and crafts, baking or cooking, or some other personal subject of interest.

Costs and providers:

Be it for academic, business or hobby purposes – you have a large variety of learning options to choose from:

  • Freely available videos on major video portals such as Youtube.com or Dailymotion.com
  • Especially designed video/multimedia courses from general providers like Udemy.com, Lynda.com and Skillshare.com, as well as training providers that specialize in particular niches like search engine optimization or the use of certain software. Often, you will be able to find such training (including certification) via the websites of those companies who also sell the corresponding software
  • One-on-one training via video communication with independent teachers/trainers
  • Online programs by accredited universities and colleges
  • Specialized podcasts, blogs, and e-books

Depending on the provider, the subject and its individual complexity, the fees for participating in remote learning can range from “free of charge” to several thousand US-dollars. While you will usually not be able to obtain a full (US-based) college education for free, you can still participate in free university courses/lectures, even from such renowned places like Stanford or Berkeley.

When it comes to training from commercial providers, look for special offers, coupon codes and trial periods to save money.

Many tutorials, webinars and basic online courses are free of charge to you, because the providers either make their money through advertising space/sponsored posts or affiliate links, or the courses are designed for promotional purposes, where you might take the basic lessons for free but will need to pay for the more in-depth training.

TechSherpas remote training can provide adequate value for money, and you can still benefit from the simple fact that you can participate remotely and on your own time – a chance that might otherwise not have been available to you at all.

Sources:

https://www.usnews.com/education/online-education/bachelors

https://www.coursera.org/

https://www.openculture.com/free_certificate_courses

https://www.macworld.co.uk/feature/iosapps/everything-you-need-know-about-itunes-u-3505231/