海角大神

Modern field guide to security and privacy

Opinion: For many Americans, cybersecurity tips aren't realistic. Here's how to change that

When handing out practical cybersecurity advice, experts should consider the millions of Americans who can鈥檛 afford their own computers and whose only Web access is through insecure connections.

|
Damian Dovarganes/AP/File
For many Americans without home Internet connections, their only access to the Web is via public networks and shared computers. In this file photo, patrons used computers at the Los Angeles Public Library.

As a young and idealistic researcher, one of the most painful lessons for me to learn was this: In real life, not everyone is able to follow best-case security recommendations.

This is especially true for the living under the poverty line. For many of them, even getting Web access means using open and insecure wireless networks and logging in with shared computers in public libraries. For Americans applying for government assistance, they often have to reveal听sensitive personal data on websites that aren鈥檛 well protected.

Those of us who are called upon to give out security advice should consider times when our recommendations are simply unrealistic, such as:听

鈥淯se credit cards instead of debit cards鈥

Credit cards offer an added layer or protection against fraud, in that they link to a line of credit rather than directly to funds. Those who don鈥檛 qualify for a credit card, may only have access to a bank card or card. When this is the case, it makes theft, fraud, and breaches . Since there is no law requiring speedy refunds in case of fraud, EBT cards have than debit cards.

鈥淚f in doubt, ask for a replacement card鈥

If you have a credit card, requesting a replacement in case of suspected theft, fraud or a breach might mean switching to a different method of payment for a while. People without a secondary payment card may not have a backup; requesting a replacement may disable all access to funds for several days at minimum, leaving them stranded in an emergency.

鈥淒o not disclose too much information online"

听Having options allows you to be choosy: What information will you disclose? What sites will you use, and which will you avoid? People requesting government assistance often do so as a last resort. As part of the application process for public assistance, people are required to give a significant amount of personal information that is often stored or entered online. And those sites against attack.

鈥淒on鈥檛 use public machines/public WiFi鈥

The great irony of government assistance programs increasingly depending on online access is that many of the people who receive assistance may not have safe access to the Internet. If you can be selective about what machines you use and how you connect them to the Internet, you can decrease your risk of eavesdropping. If not, you can鈥檛 know the intentions of those who鈥檝e shared that computer or network.

鈥淚nstall security software and encrypt your data鈥澨

If you use only your own devices to get online, you can protect your sensitive data and scan your machine for suspicious code. But that may not be a realistic expectation. If you can鈥檛 control your computing environment, you can鈥檛 be entirely sure of its integrity. This leaves data at risk.

Despite the added difficulty for people in challenging financial situations, however, there are still things that can help:

Choose strong passwords, utilize two-factor authentication

So much of online security relies on the strength of our passwords. If you have fewer alternate means of protection, this is even more important. that is different for each site you use, and do not share it with others. On any accounts , add another factor of authentication to your login process: This is as simple as enabling the site to send a one-time passcode to your email or mobile phone.

Change your passwords regularly

Those who have to use public computers or networks are at greater risk of password theft. Changing your password often limits the amount of time an attacker has access to your account.

Avoid pirated software

When funds are tight, there may be a temptation to avoid paying for software. Unfortunately, criminals know this, and will often disguise malware as popular apps. These days there are free or low-cost alternatives for most types of software. A few minutes spent researching can save hours of costly repairs.

Monitor your accounts/credit report

Many online accounts now provide a way for you to see who is logged into your account, and where they鈥檙e located. You can also receive notifications of all login attempts. Check sites鈥 security settings to see if these options are available, and disable any login instances that seem unfamiliar. It is also important to regularly check your financial accounts and for unexpected transactions.

Weak security affects more than just the individual or company who is initially targeted. As we saw with the and breaches, the expense of replacing affected cards was borne by their customers鈥 . This cost then gets passed on to banks鈥 other customers, too.听Likewise, fraud against individuals potentially can cost financial institutions, which are likely to be recuperated by passing the costs on to other customers.

When any one of us is compelled to compromise his or her security, there is a cost to all of us.

Lysa Myers began her security career in malware research in the days before the Melissa virus outbreak in 1999. Because keeping up with all that change can be difficult, as a security researcher at ESET, she aims to provide practical analysis of security trends and events for companies and consumers alike. Follow her .

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines 鈥 with humanity. Listening to sources 鈥 with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That鈥檚 Monitor reporting 鈥 news that changes how you see the world.
QR Code to Opinion: For many Americans, cybersecurity tips aren't realistic. Here's how to change that
Read this article in
/World/Passcode/Passcode-Voices/2015/0220/Opinion-For-many-Americans-cybersecurity-tips-aren-t-realistic.-Here-s-how-to-change-that
QR Code to Subscription page
Start your subscription today
/subscribe