January 28, 2009, 2:57 PM — Jack Voth, author of Chained Exploits: Advanced Hacking Attacks from Start to Finish, shares his top 5 security must-dos and 5 don'ts.
This is part of a regular series that highlights new books and their authors. Also in this series: Joel Scambray on Exposing the hacker's advantage, Scott Hogg on IPv6 Security, and Brandon Carroll on getting back to basics with wireless networking.
"Don’t implement security yourself in your own network even if you are an IT security expert. You can’t police yourself," says Jack Voth, author of author of Chained Exploits: Advanced Hacking Attacks from Start to Finish. Here he shares 5 security must-dos and surprising 5 don'ts.
About the book Chained Exploits explains how chained attacks work, and how to counter them. It covers the full spectrum of attack methods, including physical access and social engineering, and offers the practical insight and detailed information that security professionals need in order to act effectively.
- Listen to experts
- Use complex passwords that change
- Install Firewalls
- Install Anti-Virus
- Have penetration tests perform quarterly