Tuesday, January 26, 2021

Tag: The Prepper’s Guide to Cybersecurity

The Prepper’s Guide to Cybersecurity


by Daisy Luther, The Organic Prepper:

How savvy are you about cybersecurity? Technology is ever-changing, and that alone can make it overwhelming. If you have put off learning how to protect your computer, however, I urge you change that ASAP. Preppers get a lot of information and products from the internet, so you’ll want to make sure to practice good cybersecurity so you don’t give away too much of your owninformation.

According to Ceasar Cerrudo, cybersecurity should be our biggest concern. He would know. He’s a professional hacker.

Cerrudo’s company, IOActive, provides hacking services to find vulnerabilities in order to improve cybersecurity. His predictions should be a wake-up call to get savvy about cybersecurity.

Some experts predict that by 2020 there will be 200 billion connected things. Cars, planes, homes, cities, and even animals are being connected. We are putting software everywhere. This is changing the way we live and how we behave and interact with the world around us. As technology becomes more and more deeply integrated into our lives, we become more and more dependent on it. But this dependence makes us vulnerable if technology fails.

Cerrudo goes on to point out:

I see the same problems over and over again. We are not getting better. And while we depend more and more on technology, technology is becoming more and more insecure.

In my experience, most technology is vulnerable and can be hacked.

Considering how our computers, phones, cars, home security systems, banking, appliances, pace-makers, insulin pumps, and more are becoming “connected”, privacy and security have never been more important.

Cyber Threats: What Are They?

Cyber threats come from hackers and scammers. Hackers will exploit vulnerabilities on your computer or other connected devices to gain access to your private information. They do this through malware. Scammers exploit human error, naivety, and opportunity. Scammers will use phishing emails, websites, malware, or other strategies to break into your device.


Malware is the nickname for “malicious software”. It used to be that the only big threat of malware out there in cyberspace were computer viruses. Oh, how things have changed. Today, we can have adwarespywarecrapwarescareware, and ransomware.

Ransomware, such as WannaCryPetyaBadRabbit, and NotPetya have made major headlines in the past few months. They lock your computer down unless you pay a “ransom”. Of course, this often does not lead to you getting access to your computer. The hackers usually just take the money and run.



Ever get that email that says Microsoft, Amazon, eBay, or some other recognizable company claims you need to log in to your account to update security or verify your account information?

Or, how about those email scams that claim you have inherited a billion dollars from some unknown relative and Nigerian Prince Notrealperson or an attorney from Zimbabwe who needs you to wire him a thousand dollars to get the transfer of funds process started? These are examples of phishing.

Phishing emails and websites steal your login information. From here, scammers can go shopping for themselves on your dime, order gift cards which they sell, shut off your home security system, and who-knows-what-else.

The ransomware that halted shipping giant Maersk was sent through an email. John Podesta, Hillary Clinton’s campaign manager, had his emails breached because of a phishing email, resulting in the Podesta email scandal exposed by Wikileaks that many blame for Clinton’s loss.

Which Operating System Is Most Vulnerable to Cyber Attack?

Could preventing a cyber attack be as simple as picking the right operating system? Yes and no. How’s that for being as “clear as mud”?

Windows, Apple, and Linux provide the three most used operating systems. There’s been a lot of hype that Windows machines are more susceptible to cyber attack. Conversely, Apple and Linux systems were supposedly more secure.

According to this article from The Conversation, the answer is not so cut and dried. Calling it “security by obscurity”, the article had this to say about comparing Windows to Apple:

Whatever the technical vulnerabilities of the two systems, the historical lack of malware targeting Apple systems was at least in part due to Apple’s own lack of market share.

Windows had more attacks because more people used that system than Apple. The same is true of Linux. However, according to this ranking of the 10 most vulnerable operating systems, Apple and Linux have more actual vulnerabilities.

Considering that more people are now using Apple and Linux, it would be reasonable to expect more targeting of their systems, negating any “security by obscurity”.

How to Protect Yourself In a Connected World

As we have seen, there are many ways a hacker or scammer can gain access to your connected devices and your private information. Thankfully, there are simple, actionable steps you can take to keep your connected devices and private information secure.

Update Your Operating System Frequently

Every operating system has vulnerabilities. Programmers are continually updating them to fix these vulnerabilities. Check for updates frequently. In Windows, you can choose to update automatically. Just pick a time you don’t normally use your computer, or your work will be interrupted.

Install Security Software and Keep It Up-To-Date

A few things to make sure you have on your computer: a firewall (usually pre-installed) and anti-virus/anti-malware software. Sometimes, anti-virus software is pre-installed.

There are also plenty of free, downloadable anti-virus and anti-malware software available. These are usually scaled down versions of subscription-based software with additional protections. But, I like free. Free works for me.

Here is an article with top picks and more in-depth reviews of several free anti-virus and anti-malware programs available. I was happy to see the programs I use (AVG and Avira) on this list. With these options, there is no excuse not to have protection.

As with your operating system, update your security software often.

Take Your Time with Email

Most phishing scams have graduated from the “send money so I can send you money” fraud. They have become much more sophisticated.

A major red flag should be any email that asks you to enter login and password information. No company will send legitimate emails asking for this information. If you see an email asking you to enter your personal information, it’s a scam. Do not click on any of the links.

Other things to look for are typos. Phishing scams, even the sophisticated ones, usually have a typo or something “off” with the company logo. If something looks off, it probably is. Unfortunately, people in a rush tend to miss these inconsistencies.

Read More @ TheOrganicPrepper.ca