Computer Security Forensics Expert Witness:

4 Common Computer Security Myths 2014?

Electronic Forensics / Computer Forensics Expert Articles

We’ve all heard them, those little snippets of information that you heard from a friend who got it from a friend of a friend of a friend.Let us separate a little fact from fiction once and for all.

Cyber Security Expert Witness: Hacker Image on Computer

Cyber Security Expert: Security Is Everyone's Responsibility

 

#1 Antivirus and Security companies create viruses

Huh? Really? Legitimate companies DO NOT create viruses to infect your computer to get you to buy their product. Those that do this are known as “ransomware” and are in fact viruses in their own right. Legitimate companies such as Norton, Avast, and Panda, will not create a virus or infect your computer. There are plenty of real threats in the world that these companies have to deal with.

#2 The Internet is the biggest security threat

Not quite. While this statement is not wrong, the internet is a threat, who uses the internet? That’s right, we all do. The vast majority (well over 70%)of security breaches in 2013 were caused by… Human error! This is not to say that we do this on purpose, in reality we don’t, but we make mistakes. We go to those websites and click on those links that our security professionals tell us not to, bringing the security network around us crashing down. You are part of the solution. If it seems too good to be true, it probably is. If you receive an email from someone that you don’t know, don’t click on the link. If you receive an odd email from someone that you do know, you may want to contact them before clicking on any links in the email.

#3 Apple is safer than Microsoft

Some what true, we can see why people would think this. The simple answer is no, Apple is no safer than Microsoft. “But why do we see all the viruses attacking Windows machines?” you might ask. Good question. Microsoft Windows represents about 80% of the computer market, hackers know this, and basically use a shotgun approach to hacking by focusing on Windows. So no, the apple O Sis not immune to viruses. In fact, in 2012 the Flashback Trojan affected over600,000 Macs, making them inoperable. In 2013, Apple users were hit with a Java attack that came from a corrupted file on the iPhone. And this year, the Shellshock/Bash vulnerability is said to have compromised the files of over1,000,000 users. Don’t think that just because you have an Apple, that you are safe.

#4 Hackers only Target Big Businesses

Again, not true. These stories find their way into the news only because it involves a large amount of people. But there are new cases everyday of a small company or a single person getting hacked. Just because you are a smaller target, does not mean you are not a target. You have personal information stored on your computer that can be used for identity theft and fraud. It is not unusual for there to be a higher amount of small business or individual hacking incidents than big business, again, it’s just market share. Protect yourself. If you have a small company use a skilled, legitimate information systems partner. Regularly get an outsider’s point of view. IT professionals can tend to believe that if they set it up and it is running then all is ok. An outsider’s point of view can help your IT insider see what they are missing.

 

By Sean Greene

Evidence Solutions, Inc.

Complex Electronic Evidence in PLAIN English.

Call us today with your Computer Evidence Questions: 866-795-7166 or This email address is being protected from spambots. You need JavaScript enabled to view it.

 

Related Forensics Expert Articles

Why Should I be Concerned About Cyber Security? | Forensics

Why EMR data is attractive to Hackers - EMR Forensics Expert

Six Steps to More Security and Privacy - Computer Security

 

Complex Electronic Evidence in PLAIN English.

Like Evidence Solutions - Digital Evidence Expert Witnesses on Facebook

Follow Evidence Solutions - Computer Evidence Expert Witnesses Division on LinkedIn

Circle Evidence Solutions - Computer Forensics Division on Google+

Google+ Author

Google+ Publisher