How to Secure Your Computer: Maxim #1

Those of us involved in computer and network security can get so engrossed in the cat-and-mouse game that we overlook the obvious. We implement high-tech, state-of-the-art intrusion protection on our networks and servers. We set up spam filters, content filters and email blacklists. Our antivirus definitions are updated in real time. And we are truly baffled when the alarms go off and we find Susie User’s PC infected with umpteen backdoors, IRC bots and a rootkit. How did these things escape detection?

Allow me to present Computer Security Maxim #1, the first in a series that introduces my upcoming e-book (title to be announced) on why security measures fail. In the book, I will offer practical solutions to the problems everyone faces in today’s Wild, Wild Web computing climate, including advice from well-known experts in the computer security field. Here’s the first one:

The best security measures are completely useless if you invite attackers into your PCs or networks.

Cheers!
The Geek

Have a computer problem? A question about your latest gadget? Click here to Ask the Geek! Kenny “The Geek” Harthun has been playing with geeky stuff since 1965. He’s a Microsoft Certified Systems Engineer with Connective Computing, Inc. providing network, desktop and info security support services to a wide range of clients.