5 security must-dos - and 5 don'ts

Jack Voth, author of Chained Exploits: Advanced Hacking Attacks from Start to Finish, shares his top 5 security must-dos and 5 don'ts.

This is part of a regular series that highlights new books and their authors. Also in this series: Joel Scambray on Exposing the hacker's advantage, Scott Hogg on IPv6 Security, and Brandon Carroll on getting back to basics with wireless networking.

Chained Exploits

"Don’t implement security yourself in your own network even if you are an IT security expert. You can’t police yourself," says Jack Voth, author of author of Chained Exploits: Advanced Hacking Attacks from Start to Finish. Here he shares 5 security must-dos and surprising 5 don'ts.

Bio

Name: Jack B. Voth

What I'm working on now: I am currently designing video security solutions that require only solar power, 3g wireless card, an IP surveillance camera, and an enclosure.

Something most people don't know about me: I would rather be sitting in a canoe fly fishing on a quiet mountain pond.

Philosophy: Lead by example.

About the book Chained Exploits explains how chained attacks work, and how to counter them. It covers the full spectrum of attack methods, including physical access and social engineering, and offers the practical insight and detailed information that security professionals need in order to act effectively.

5 must-dos

  • Listen to experts
  • Use complex passwords that change
  • Install Firewalls
  • Install Anti-Virus
  • Have penetration tests perform quarterly

5 don'ts

  • Don’t implement security yourself in your own network even if you are an IT security expert. You can’t police yourself.
  • Don’t assume that because you are small that you are not susceptible to an attack.
  • Don’t skimp on your security solution.
  • Don’t open that email unless you are sure what it contains.
  • Don’t forget to change your password.

Words of wisdom: Always keep learning; never grow complacent in the security technology that you understand today, it will change.

Insider: How the basic tech behind the Internet works
Join the discussion
Be the first to comment on this article. Our Commenting Policies