Information Security  Links

Information Security Links

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Backup    Basics  Cybercrime  Passwords   Encryption  Miscellaneous

 

 Phone Security  OS Security    Hardware Security

 

A bunch of curated links to help educate individuals and small non-profits so they can remain secure in the digital age.

 

The Apostle Paul, the Apostle John and Information Security

 

Backups

 

Why Backup?

 

https://www.dropmyemail.com/business/why_backup

http://www.riscitsolutions.com/news/archived-news/why-you-should-backup

 

The Beginner's Guide to PC Backup

http://www.pcmag.com/article2/0,2817,2363057,00.asp

http://www.debianhelp.co.uk/backupbasics.htm

 

Basics

 

Top Ten Safe Computing Tips

https://ist.mit.edu/security/tips


Phishing Emails 


The most common examples of phishing emails (usecure.io)

 

Stories & Examples: Phishing Education & Training: Indiana University (iu.edu)



Credit Card Fraud


https://upgradedpoints.com/credit-cards/credit-card-skimmer-fraud/ 


Cybersecurity Questions For Businesses


What Your Board Needs to Know About Cyber Threats – Nonprofit Risk Management Center

 

 

Digital Safety for Children and Teens

 

https://onlinemasteroflegalstudies.com/resources/how-parents-educators-protect-childrens-online-privacy/

 

https://routersnetwork.com/life-changing-guide-to-protect-your-children-on-their-smartphone/

 

Teaching Teens Online Safety:  https://www.mytutor.co.uk/blog/parents/the-parents-guide-to-teaching-your-teen-online-safety/

 

The cyber.org Range is a no-cost, safe, virtual environment for K-12 students to learn cybersecurity skills.


Project Access focuses on introducing blind and vision-impaired students to cybersecurity and the possibility of cyber careers

https://cyber.org/initiatives/project-access


Digital Safety For Seniors

 

Seniors and Digital Money: https://www.comparethemarket.com/credit-cards/content/digital-money-for-seniors/

 

Cyberbullying

 https://www.nominus.com/en/dm/blog/hosting/cyberbullying-a-guide-to-internet-and-computer-safety

 

Digital Safety for Journalists

http://en.rsf.org/IMG/pdf/guide_journaliste_rsf_2015_en.pdf  see ch. 4

 

Cybersecurity Resources Guide

https://www.mastersindatascience.org/resources/cybersecurity-resource-guide/

 

Basics - Passwords

 

Choosing Secure Passwords

https://en.wikipedia.org/wiki/Password_strength#Guidelines_for_strong_passwords

https://www.schneier.com/blog/archives/2014/03/choosing_secure_1.html

 

Don't use these passwords

https://blog.kaspersky.com/10-worst-password-ideas-as-seen-in-the-adobe-hack/3198/

http://lifehacker.com/5937303/your-clever-password-tricks-arent-protecting-you-from-todays-hackers

 

Random Password Generators

https://www.random.org/passwords/

 

http://world.std.com/~reinhold/diceware.html

 

https://www.safetydetectives.com/password-meter/

 

Use a password safe

Lastpass  https://lastpass.com/simpledownload.php

Keepass  http://keepass.info/

Password Safe  https://pwsafe.org/

 

How Your Passwords Are Stored on the Internet (and When Your Password Strength Doesn't Matter)

http://lifehacker.com/5919918/how-your-passwords-are-stored-on-the-internet-and-when-your-password-strength-doesnt-matter

 

Cybercrime

 

Introduction to Cybersecurity and Data Protection (University of York)

 

Identity Theft Protection Guide

 

Internet Fraud Statistics for 2022

 

Encryption

 

Encrypting hard drives

 

http://www.pcworld.com/article/2858642/you-can-encrypt-your-hard-drive-but-the-protection-may-not-be-worth-the-hassle.html

https://answers.syr.edu/display/software/Encrypting+your+external+hard+drive+on+Windows+and+OSX

http://lifehacker.com/a-beginners-guide-to-encryption-what-it-is-and-how-to-1508196946

VeraCrypt  https://veracrypt.codeplex.com/ also does hidden volumes

GNU Privacy Guard  https://www.gnupg.org/  does external and USB devices

 

 

Encrypting files

 

Five Best File Encryption Tools: http://lifehacker.com/five-best-file-encryption-tools-5677725

 

7-Zip  http://www.7-zip.org/

 

 

Encrypting email

http://lifehacker.com/how-to-encrypt-your-email-and-keep-your-conversations-p-1133495744

 

Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance https://freedom.press/encryption-works

GPG  https://www.gpg4win.org/

 

 

Miscellaneous


NIST Guidance for Small Organizations


https://doi.org/10.6028/NIST.SP.1300



Investing in People – Why Training is the Best Defence Against Cyber Security & Data Threats

https://thomasmurray.com/training-employees-cyber-security/index.html


Anonymous Browsing

Tor  https://tor.eff.org/

 

Cybersecurity Degree Courses

Find a relevant Cybersecurity degree:  https://cybersecuritydegrees.org/programs/

 

Gmail 2024 Hack Attack Advice: Turn It Off And On Again, Google Says (forbes.com)

 

How To Tell If Social media Is Affecting Your Mental Health


Top Privacy Tools for 2024. Protect your personal data from bad actors… | by Matthew Bill | Jan, 2024 | Medium

 

VPN

VPN Beginner's Guide - What Is A VPN

 

Legality of VPNs in 35 Jurisdictions  and how to keep away from dictatorships and intelligence agencies.

 

Wordpress

 

When you should NOT use WordPress for your Website? http://webhostingmedia.net/when-not-use-wordpress/

http://wordpress.stackexchange.com/questions/10594/when-should-we-not-recommend-a-client-use-wordpress

 

 

Phone Security

 

http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm

 

Personal Smartphone Security Best Practices: https://www.securedatarecovery.com/resources/guide-to-personal-smartphone-security

http://money.usnews.com/money/personal-finance/articles/2015/01/13/10-ways-to-keep-your-phone-safe

http://www.verizonwireless.com/mobile-living/network-and-plans/security-app-tips-to-keep-your-smartphone-secure/

 

https://smartphoneinsight.com/how-to-keep-your-phone-secure/

The Best Mobile Security Apps:  http://www.pcmag.com/article2/0,2817,2402099,00.asp

 

 

Securing Your Operating System

 

Securing Windows

 

http://blogs.microsoft.com/cybertrust/2012/07/31/microsofts-free-security-tools-series-introduction/

 

https://blogs.microsoft.com/cybertrust/2013/01/15/microsofts-free-security-tools-microsoft-security-compliance-manager-tool-scm/

 

Norton Security Scan  https://security.symantec.com/nss/getnss.aspx?

 

AVG antivirus  http://www.avg.com/us-en/free-antivirus-download

 

http://www.superantispyware.com/

 

http://www.mcafee.com/us/resources/white-papers/foundstone/wp-low-hanging-fruits.pdf

 

 

Securing Redhat and Centos Linux (300 pages)

 

https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/pdf/Security_Guide/Red_Hat_Enterprise_Linux-7-Security_Guide-en-US.pdf

 

 

Securing Hardware

 

Vulnerability Scanners

On line port scanner  Port Checker - Check Open Ports Online (dnschecker.org)

https://community.rapid7.com/community/infosec/blog/2013/01/29/security-flaws-in-universal-plug-and-play-unplug-dont-play

 

Metasploit:  http://www.metasploit.com/   also cheat sheet for Metasploit


OpenVAS:   http://www.openvas.org/

 

 

Securing ports

http://lifehacker.com/198946/how-to-portscan-your-computer-for-security-holes

http://www.techradar.com/us/news/networking/how-to-secure-your-tcp-ip-ports-633089

http://www.techrepublic.com/article/lock-it-down-develop-a-strategy-for-securing-ports-on-your-servers/

Shields Up: https://www.grc.com/default.htm

 

 

Securing Routers


https://www.avg.com/en/signal/prevent-router-hacking


http://security.stackexchange.com/questions/77112/danger-of-default-router-password

http://www.acunetix.com/blog/web-security-zone/the-email-that-hacks-you/

http://www.howtogeek.com/173921/secure-your-wireless-router-8-things-you-can-do-right-now/