Expert Debunks Worthless “Security” Practices And Myths

Share post:

IT expert Sean Gallagher recently published a list of the most worthless security practices that everyone should avoid. Below are five of the most prolific cybersecurity myths.

MYTH 1: Change Your Password Every 30 Days

The low security of short passwords has led to new guidelines requiring passwords to be changed regularly. However, policies that restrict the characters that can be used as passwords tend to weaken complexity and security. Long passwords with characters, spaces, and punctuation marks are much more memorable for the user than arbitrary numbers that can easily be forgotten.

Users are instead advised to choose a relatively long and complex password for home or work computers and only change it if it is stolen or shared with someone. Changing passwords every 30 days or as required only makes it more difficult to remember passwords and can result in users developing poor password creation workarounds that lead to less secure passwords.

MYTH 2: Don’t write it down.

Passwords should only not be written down in public places such as the desk or cubicle. Moreover, many two-factor authentication services encourage printing and saving recovery codes if users ever lose access to a second-factor app or device. You can also choose to save them in your device’s password manager.

Such high-quality passwords should be complex and memorable, but when used very rarely, they tend to be more easily forgotten, so it is actually a good idea to write them down in a secure, private place.

However, never store passwords in a text file or any other unencrypted format that does not have password protection.

MYTH 3: 2FA is scary.

Two-factor authentication (“2FA”) is an excellent way to protect login credentials after a threat actor manages to steal a user’s password. Any 2FA is better than no 2FA, as 2FA thwarts nearly 90% of all hacking attempts.

But just having 2FA is not a guarantee that someone won’t succeed in getting what they want. If you receive an e-mail link that will navigate you to a website that asks you to enter your login credentials, and you then receive a 2FA warning for your login, be vigilant, as this does not lead to the legitimacy and trustworthiness of the link. Take a close look at this link and do not just enter the code or click the approve button. If in doubt, stop the process altogether.

MYTH 4: Your VPN protects you.

Virtual private networks are no longer very useful; they merely hide the Domain Name Service requests a user makes and the resulting IP addresses that are visited by the Internet Service Provider. This significantly prevents a user’s ISP from collecting data about their Internet habits but instead gives this privilege to the VPN provider.

In such cases, VPNs do not prevent VPN providers from using panic advertising to get you to download VPNs for your computer or phone.

MYTH 5: You don’t need antivirus.

An updated Microsoft Defender installed on a properly configured Windows 10 or Windows 11 system is very well suited for blocking known threats. However, the number of misconfigured, semi-disabled, un-updated systems is, unfortunately, the majority of computers that are connected to the Internet. Therefore, antivirus is extremely important.

If any software tells you to disable the antivirus software for a folder so that it can run properly, the best advice is to just not use this software.

For more information, read the original story in Ars Technica.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, April 24, 2024 – Good news/bad news in Mandiant report, UnitedHealth admits paying a ransomware gang, and more

This episode reports on the danger of using expired open-source packages, a tool used by a Russian hacking group and passw

Google Play introduces new biometric verification with a user warning

Google has recently announced updates to the biometric verification process for Google Play purchases, aiming to bolster security...

Cyber Security Today, Week in Review for week ending Friday April 19, 2024

On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT d

Cyber Security Today, April 19, 2024 – Police bust phishing rental platform, a nine-year old virus found on Ukrainian computers, and more

This episode reports on a threat actor targeting governments in the Middle East with a novel way of hiding malware is going international

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways