5 security must-dos - and 5 don'ts

ITworld |  Security, book

Jack Voth, author of Chained Exploits: Advanced Hacking Attacks from Start to Finish, shares his top 5 security must-dos and 5 don'ts.

This is part of a regular series that highlights new books and their authors. Also in this series: Joel Scambray on Exposing the hacker's advantage, Scott Hogg on IPv6 Security, and Brandon Carroll on getting back to basics with wireless networking.


Chained Exploits

"Don’t implement security yourself in your own network even if you are an IT security expert. You can’t police yourself," says Jack Voth, author of author of Chained Exploits: Advanced Hacking Attacks from Start to Finish. Here he shares 5 security must-dos and surprising 5 don'ts.

Bio
Name: Jack B. Voth
What I'm working on now: I am currently designing video security solutions that require only solar power, 3g wireless card, an IP surveillance camera, and an enclosure.
Something most people don't know about me: I would rather be sitting in a canoe fly fishing on a quiet mountain pond.
Philosophy: Lead by example.

About the book Chained Exploits explains how chained attacks work, and how to counter them. It covers the full spectrum of attack methods, including physical access and social engineering, and offers the practical insight and detailed information that security professionals need in order to act effectively.

5 must-dos

  • Listen to experts
  • Use complex passwords that change
  • Install Firewalls
  • Install Anti-Virus
  • Have penetration tests perform quarterly

5 don'ts

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question
randomness