![]() Therefore, each item in this list is accompanied by a brief explanation. Just telling them "don’t do that" may help for a bit, but advice is better retained if it's grounded in practical reasoning. With most people, it helps to know why they shouldn’t download or click on links in emails that look like they came from a legitimate institution. Therefore, knowing what not to click on and download can keep a good portion of threats off a lazy person's device. So many of today's most dangerous threats are delivered through social engineering, i.e., by tricking users into giving up their data or downloading the malware themselves from an infected email attachment. Your first step should always be user education. Lazy security is a good way to protect those who prefer to do nothing rather than be overwhelmed by 50 somethings, but it shouldn’t have severe consequences if it goes wrong. So, let’s see if we can work out a system of minimum effort that renders reasonable results.īefore we begin, we will should note that lazy cybersecurity should not apply to devices used to store sensitive data, conduct financial transactions, or communicate confidential or proprietary information. The funny thing is, with adequate cybersecurity, Uncle Bob's-and by extension all of our-problems would be much less frequent and less severe. And as his helper, you're probably pretty over it, too. Multiple passwords, reading through EULAs, website cookies that he clicks "agree" to without really paying attention-they're giving him a serious case of security fatigue. It's that he's overwhelmed by the amount of stuff he has to do to keep his data and devices secure. Uncle Bob needs a lazy person's guide to cybersecurity. ![]() To keep Uncle Bob's computer safe without blowing up the Internet, we need to give him the simplest of instructions that result in protecting him against as much as possible. He’s a nice guy, but with computers, he’s not just an accident waiting to happen-he's an accident waiting to become a catastrophe. Are you tired of that acquaintance who keeps bugging you with computer questions? Do you avoid visiting certain people because you know you will spend most of the evening cleaning up their machine? ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |