Posted on Nov 9, 2015
SGT Roberto Mendoza-Diaz
1
1
0
Posted in these groups: Cpu 1 Cybersecurity
Avatar feed
Responses: 7
SSG Avenger Crew Member
2
2
0
How about we mail them an EMP care package? It would take em' so far back that they would have to rub sticks together to make fire!
(2)
Comment
(0)
Avatar small
SFC Motor Transport Operator
2
2
0
stay away from the internet and social media at least !!!
(2)
Comment
(0)
Avatar small
SGT(P) It Specialist
1
1
0
I would say as some and that the only true way is to minimize the risk is by knowledge and practice. Social media is here to stay and credit cards/debit cards are all over. So everything most people do or use is tracked in some way. If you read, listen and make yourself aware of the things going on around you, you can atleast have the knowledge of what to say or do in certain situations and on the technology you use. Your smartphone, computer, and the social media you use. Situational awareness has become more than just, " watch your 6."
(1)
Comment
(0)
Avatar small
Avatar feed
What is the best possible strategy to fight against cybercrime?
SSG Sr Security Analyst
1
1
0
I saw this and my first thought, like many here, was to say cut all ties to the Internet. However, just keep an eye on who delivers your pizza or enters your house. One thumb drive is all it takes to own your data regardless of your connectivity...
(1)
Comment
(0)
Avatar small
SrA Edward Vong
1
1
0
Cyber-crime evolves with the technology being used. There is no way to truly end it, but continuous research and development gives cyber criminals a harder time.
(1)
Comment
(0)
Avatar small
SSG Michael Hathaway
1
1
0
Perhaps the best way is also the most disruptive, counter-productive method. Stay off the grid and offline, period. Or if required to go online, keep personal information, personally identifiable information, and sensitive data (financial or medical records being prime) off any system that you use to connect online as well as off any sites.

Regardless of outside connectivity, you should have proper protections in place to include secure configurations of your computers utilities like the build in firewall in windows, turning off bluetooth, turning of wireless if not needed, setting up windows defender. Third party application and utilities are also useful to either augment, replace build in utilities, or add utility functions to the system. You should have a modicum of protection suites, at the very least, to safeguard you against malware, phishing, web tracking, script blocking, and such.

Even if you visit sites that you know and trust, a key thing to remember is never trust 100% online, no matter the source. There are documented cases in which a highly trusted site was either hacked and unintentionally exposed users to malicious activities or an ad (or other third party service) was introduced which infected visitors. Remember, you don't have to click something to have it activate malware, simply loading a image file can have repercussions.

With cyber, perhaps the best weapon to use is knowledge. Ignorance is definitely not bliss when dealing with security and information systems. Arm yourself with awareness, basic do's and don'ts of the cyberworld, how to recognize problems, best practices for personal and professional use, etc.
(1)
Comment
(0)
Avatar small
SSgt Alex Robinson
1
1
0
Robust antivirus protection, a stout firewall, and know the websites you were going to go.
(1)
Comment
(0)
MSG John Wirts
MSG John Wirts
10 y
The problem with anti-virus and security firewalls are that programs are devised to circumvent them as fast as new programs are developed. Security programs are either lax enough to allow usage and inadequate for cyber protection. or so secure that they are unusable. Making sure that the result of cyber attack is immedate retalation, and total destruction of the cyber attack equipment, and site.
(0)
Reply
(0)
SSgt Alex Robinson
SSgt Alex Robinson
10 y
MSG John Wirts - A hardware fire wall such as a sonicwall along with proper AV software will go a long way in protecting you.
(0)
Reply
(0)
MSG John Wirts
MSG John Wirts
10 y
Yes, but I remember the TI 16k memory computer, and the Commodore 64 k computers. These had no cyber connection, and no viruses, once the different computers got connected on the internet the HACKERS arrived. The kids today are far more dangerous then some of the more innovative programmers of yesterday. If you put strong enough security on the system, NO ONE can use it. If you put strong security in place the legitimate users and the innovative hackers will get in. The only way to stop hackers is to one isolate the system from the internet totally, or two impose severe consequences for hacking. Isolation from society and the internet for domestic hackers. Destroy cyber warfare sites in foreign countries, and blockade trade with rest of the world until they dismantle their cyber warfare sites and programs. Until and unless these consequences are certain trhere will be no secure way to remain connected to the internet.
(0)
Reply
(0)
Avatar small

Join nearly 2 million former and current members of the US military, just like you.

close