Cybersecurity Month: Defense in Depth for the Everyday User

October 29, 2015

In recognition of Cyber Security Awareness Month, the Federal Bureau of Investigation (FBI) has provided tips to protect networks, devices and data from cyber threats.

To protect systems and data in the corporate world, the FBI said computer network defenders use the “Defense in Depth” principle, which focuses on implementing several layers of security to guard against cyber threats or, in the unfortunate case of a cyber compromise, to quickly detect and mitigate its effects.

For one, the FBI says to protect mobile devices from cyber intruders in public places. Not all wireless network hotspots have strong security protections. In many cases, it’s easy for the person sitting next to you, in the vehicle outside, or on the other side of the building to “sniff” traffic as it passes through the network and collect the content of your communications and your login information to sensitive sites. Users should void logging into sensitive accounts (such banking, social media and email) through wireless networks. It’s recommended to use a virtual private network (VPN) service provider. A VPN encrypts data and adds a layer of security to communications, which makes it much more difficult for cyber snoops to steal information.

Another technique is the out-of-band backup—which is backing up your data to a cloud environment or storing hard copies of data at a different physical location. Many people back up their information to external hard drives connected to their computers on their home networks, But given recent trends in ransomware—a type of malware that infects computers and restricts users’ access to their files or threatens the destruction of their information unless a ransom is paid—cyber criminals can encrypt both the computer and any devices attached to it. Storing your backup out-of band is also useful in protecting data from natural disasters (fire, flood, etc.) that can destroy your physical devices.

Here are some other ways to defend your computer systems:

  • Ensure your operating system and software are up to date with the latest patches and versions and enable your firewall.
  • Install protective software (i.e., antivirus, antispyware), and run scans on a periodic basis.
  • Disable hidden file extensions (i.e., uncheck “hide extensions for known file types”) to ensure the file is what it purports to be.
  • Ignore unsolicited e-mails and be wary of attachments, links, and forms in e-mails that come from people you don’t know, which can contain malicious files or links.
  • Change the default administrator name and password on your wireless router, as well as the default SSID (service set identifier).
  • Use the built-in cover or tape over your webcam when not in use.
  • Disable guest accounts on your computer.
  • Use strong passwords for each computer account and disable automatic login.
  • Don’t read email or browse the Internet using an administrator account.
  • Don’t leave your computer on 24/7—turn it off when you’re not using it.
  • Wipe your hard drive with disk wiping/cleaning software before you sell or recycle your old computer.

According to the FBI, there is no one method or tool that will completely protect a business from various cyber threats, but by using sound practices and implementing good security protections, companies can raise the bar against the adversary and better protect important data.


Contact ALTA at 202-296-3671 or communications@alta.org.