Total Pageviews

Monday, 3 July 2017

Encryption Resources

As technology develops, so too do concerns about the privacy of our data. Thankfully, though, there are ways we can protect it. One of these ways is through encryption. This is something many companies already use (e.g. Amazon when you’re using your credit card) and it involves scrambling information so no one can decrypt it without authorization. You can also encrypt files on your computer, secure your emails, and make sure your cloud storage is safe.
Whether you’re new to encryption or you wish to delve deeper into the topic, below you’ll find some handy resources that will tell you more about this method of protecting data.

Guides About Encryption

To learn more about encryption as a beginner or expert, these guides will provide you with all the information you need to know:
LifeHacker.com –  Aimed at beginners, this guide will talk you through what encryption is, what the benefits of encrypting your files are, how to encrypt your files and how to encrypt your entire hard drive.
Ebuyer.com – A detailed resource on USB encryption, including what the advantages are, why businesses should encrypt their data, what levels of protection there are and how you should choose your level of security.
BusinessNewsDaily.com – A guide to computer encryption for small businesses, this resource explains why encryption is so important, what types are available and what built-in or third-party programs are best.
Microsoft.com – Here you can learn about cryptography from one of the world’s leading software companies. In this guide, Microsoft talks you through encryption, digital certificates, secret keys and public/private keys.
ico.org – This UK-based website from the Information Commissioner’s Office provides a basic overview of encryption and what it means for organizations in the UK.

Guides About Cryptology

Cryptology is the art of solving and writing codes, which is a fundamental process in encryption. If you’re interested in getting to grips with the technical aspects of cryptology or you’re wanting to become a cryptologist, the below resources provide you with some useful terminology, tips and advice:
LearnCryptography.com – On this website you’ll find a great overview of encryption, including cryptanalysis and cryptocurrency (Bitcoin). The website also delves into mathematics, steganography and general computer security.
Comparitech.com – This helpful guide covers some useful cryptography terminology and also points you in the right direction for further resources, organizations, books, and papers. A great guide for those looking to learn more and further their cryptology learning.
OWASP.org – Offering a “Guide to Cryptology” this resource covers a variety of topics including cryptographic functions, cryptographic algorithms, algorithm selection and key storage. With sections that cover how to determine if you’re vulnerable and how to protect yourself, this guide is great for making sure you’re using cryptology safely.
NIST.gov – The National Institute of Standards and Technology has produced a Cryptographic Toolkit. Here you’ll find a collection of guidance and standards, which will help you to protect your operations, communications and data. This has been produced to help U.S. government agencies but will also benefit other organizations.

Choosing Tools for Encryption

A number of tools can help you to protect your data through encryption. Detailed below are some helpful resources that will offer you advice on what tools are available and what benefits they will provide you with.
HeimdalSecurity – This article offers nine free encryption software tools that you can start using straight away. These include ones that help you to encrypt your online traffic, files and your online accounts.
SDD.EFF.org – Within this resource you’ll find some helpful advice when it comes to choosing your encryption tools. It covers everything from how transparent the software is to what to do if the software creators become compromised.
LetsEncrypt.org – This tool helps you to create an HTTPS server that gains a browser-trusted certificate automatically and without the need for human intervention. The tool is free and is brought to you by the Internet Security Research Group (ISRG).
GnuPG.org – As another free tool, the GNU Privacy Guard helps you to sign and encrypt your communication and data. It can be easily integrated with other applications and provides you with a flexible key management system.
DMOZ.org – A handy guide that provides you with links to a whole host of sources that offer file encryption tools. These include ones that automatically decrypt or encrypt folders and files as well as ones that provide access control over removable media.
ResettheNet.org – As the ultimate privacy pack, this resource points you in the right direction when it comes to protecting the data on your phone or your computer. It offers advice on which tools are best, covering various systems including Windows and Mac.
ICFJ.org – Produced by the International Center for Journalists, this guide suggests six encryption tools that journalists should use. These are all aimed at protecting emails, including Peerio, Hushmail and OpenPGP. You’ll also find handy links about how you can use these tools and integrate them with your system.
Comparitech – This guide offers a list of free software used to encrypt individual files and folders before uploading them to unencrypted cloud storage providers like Google Drive, Microsoft OneDrive, and Dropbox.

News and Opinion

If you’re starting to get fanatical about encryption, the below resources show you where to find other like-minded individuals. Hear from some industry-leading experts and discover organizations that are devoted to improving public safety.
Cipher – This is the newsletter produced by the Technical Committee on Security & Privacy who are part of the IEEE. You can also find information on the latest research events and calls for papers.
Epic.org – The Electronic Privacy Information Center publishes a wide range of articles and news-related guides in a bid to protect privacy. They cover a variety of hot topic issues, including encryption.
Bristol Cryptography Blog – This is the University of Bristol’s official blog, which allows you to follow their latest research developments and discussions on related topics. Ideal if you’re a crypto student or cryptographer.
Philip Zimmermann – Zimmermann created an email encryption software package, Pretty Good Privacy (PGP). On his website, you can find out more about him as well as further readings on PGP.
Bunnie’s Blog – If you want to get inside the mind of one of the world’s most famous hardware hackers, now’s your chance. Bunnie’s blog is run by the first person to hack an XBox and brings you a variety of interesting security-related topics.
Crypto-Gram – This free monthly e-newsletter is produced by Bruce Schneier, a leading expert on encryption. Discover the latest news as well as Schneier’s thoughts and advice.

Additional Resources

Below are some further resources which will come in handy if you’re looking to enhance your encryption knowledge. This includes the best books on the topic and a forum where you can have all your encryption-related questions answered.
Cryptography Engineering – Produced by Tadayoshi Kohno, Bruce Schneier and Niels Ferguson, this book is an updated version of Practical Cryptography, an international bestseller.
Crypto StackExchange – If you’ve got any questions you want answering, this website is the perfect place to go. With a community of crypto-fanatics, this Q&A site covers all the latest hot topics.
Modern Cryptography: Theory and Practice – This book by Wenbo Mao provides you with a great introduction to cryptography and goes into much more detail than many of the online resources.
Handbook of Applied Cryptography – Available as a PDF, this book provides you with 794 pages of detailed information on encryption. It covers basic terminology and concepts, public-key cryptography, hash functions and stream ciphers along with a plethora of other useful topics.
IACR – This non-profit scientific organization, the International Association for Cryptologic Research (IACR), has been established to provide further research in cryptology and other related topics. On the website you’ll find the latest meetings, news updates and events。

from  https://www.comparitech.com/vpn/encryption-resources-tools-guides/
--------------

0
Cybersecurity resources

Being safe on the Internet is becoming increasingly important, especially when more and more of our data is being shared online. This handy list of resources will help you to find the right tools, information, and guides on cybersecurity so you can make sure you, your family and your business are surfing safely.

Guides About Cybersecurity

To learn more about cybersecurity and what the best practices are, these resources will provide you with in-depth advice:
Connectsafely.org – This website provides a wide range of guides, tips and advice for those who are looking to improve their online security. There’s also a handy guide for parents looking to improve cybersecurity for their kids.
Internetmatters.org – Within this handy guide you’ll find some interesting stats and to-do lists as to how you can keep your children safe while surfing the Net.
SecurityIntelligence.com – A free eBook is available here, which offers practical advice about how you can stay one step ahead when it comes to your cybersecurity. It’s great for those trying to learn about online security as well as those who are a little savvier and are looking for some inspiration and new ideas.
CSBS – The Conference of State Bank Supervisors has produced a resource guide for bank executives, covering a plethora of topics, including how to protect yourself from and detect cyber threats.
Techradar.com – This beginner’s guide to Internet security will demonstrate how you can protect yourself from various scams, including phishing emails and viruses. With everything explained in layman’s terms, it’s easy to understand and covers all of the essential basics.
Consumerreports.org – On this web page you’ll find various guides, including ones on privacy and protecting your personal data. This is regularly updated with the latest security threats and news, so you’ll be able to keep on top of all of the latest scams, viruses, and so on.
Nova Labs – Here you’ll find guides for those who are educating others about cybersecurity, including lesson plans, a glossary of terms, and an interactive game.
Electronic Frontier Foundation – This website offers advice on surveillance self-defense, including basic guides, step-by-step tutorials, and detailed articles on specific situations.
Infosec Institute – Aimed at those training in information security, this resource provides information on available courses as well as guides on a variety of online security topics, including cloud computing and hacking.
UK Government – If you need to learn more about cybersecurity in the UK, the British Government produced a free guide to help small businesses improve their online security.

Choosing Tools to Improve Your Online Security

A number of tools can help you to improve your online security. Listed below are some handy resources that will point you in the right direction, offering advice as to which tools will provide you with the best solutions:
TechRadar.com – This resource offers small businesses advice on the top security tools, including detailed reviews and the advantages and disadvantages of each of the products included.
Comparitech – Here you’ll find helpful reviews of the top cybersecurity products available, including antivirus, VPNs, and online backup products. You’ll also find helpful information about why you need certain programs, what protection levels you need and whether there are any free programs that you can use safely.
CIO – Within this guide you’ll find advice for businesses about choosing the best vulnerability scanning tool, including software- and cloud-based solutions.
TechWorld.com – In this article you’ll discover what’s involved in online privacy and how you can achieve browsing secrecy. It also includes reviews of some of the top online privacy browsers, search engines and DNS nameservers.

News and Opinion

Want to learn more about cybersecurity? These resources will help you to stay on top of all of the latest developments in online security.
Google – Find out more about safety on the Internet and what security measures Google puts in place through its blog, which provides you with all of the latest news and insights straight from Google HQ.
Krebs on Security – Here you’ll find in-depth investigation and news on online security from Washington Post reporter, Brian Krebs.
Comparitech.com – On the Comparitech blog you’ll find a variety of articles that cover everything from the latest news to handy how-to guides. You can also subscribe to their newsletter so all of this valuable information is delivered straight to your inbox.
Microsoft Malware Protection Center – Perfect for Microsoft users or those working in IT, this blog provides you with up to date research and news directly from Microsoft, helping you to stay one step ahead of any security alerts.
Security Bloggers Network – Instead of having to trawl through hundreds of different blogs to find out the latest news, this website brings together over 300 podcasts and blogs into one, easy to digest platform.
ZDNet – This resource will help you to stay on top of all of the latest computer attacks, threats, vulnerabilities and software security research.
The Guardian Security Hub – If you need to keep abreast of the latest security news in the UK, the information security section of The Guardian will keep you updated on all of the latest cyber security and information news. All of the articles are written in layman’s terms so are ideal for everyone.

Additional Resources

CVE –  This resource is free to use and provides you with a handy dictionary of known security exposures and vulnerabilities. It’s funded by the office of Cybersecurity and Communications at the U.S. Department of Homeland Security.
Information Security Stack Exchange – Got a question about security that you want answering? This resource is a message board site that allows users (often information security professionals) to ask questions or answer them.
U.S. Department of Homeland Security – With an area dedicated to cybersecurity, this resource comes direct from the DHS, providing you with the latest security announcements and analytic reports and statements.
US – Cert – The U.S. Computer Emergency Readiness Team is another offshoot of the Department of Homeland Security’s NCCIC. Here you’ll find a vulnerability notes database as well as updates on potential threats and vulnerabilities。

from  https://www.comparitech.com/antivirus/cybersecurity-resources-and-tools/
----------

A list of resources to keep you safe from identity fraud

Identity fraud can strike at any moment, and that is why it is important to have the right knowledge to fight against it. However, with so many resources online, it may be difficult to know where to start.
Understanding the basics about identity fraud is essential, and that includes knowing about different kinds of identity fraud along with the various risk factors. Computer users should be aware of the services that help prevent sensitive data from being stolen. In the event of identity theft, victims should know how to minimize the damage.
The resources below provide detailed information and tools on all of these points, allowing for a greater understanding of identity fraud and its prevention.

Learning the Basics About Identity Fraud

These resources offer a comprehensive overview of identity fraud, including educational articles on data security, current scams and assistance for victims:
Identity Theft Resource Center – This website was established to support victims of identity theft by providing resources on recent data breaches and current scams that leave individuals vulnerable to identity theft. It also lists assistance resources for victims according to the type of identity theft they were involved in (medical, financial, child, etc.).
InfoSec Institute – The InfoSec Institute provides comprehensive learning tools and guides for a variety of data security topics. Users can research how to keep their data secure from hacking attempts and phishing attacks. They can also access a complete guide describing the information sources that identity thieves usually target and the criminal methods used to access these sources.

Different Types of Identity Fraud

These websites provide useful information for understanding identity fraud that is aimed at particular types of data, such as business data, medical data and the data of children:

Business Identity Fraud

BusinessIDTheft.org – This organization seeks to fight identity fraud targeted specifically at businesses. It discusses the identity fraud risks that businesses face and how to help avoid them. A particularly helpful resource on this website is the Business Identity Theft Victim Action List, which tells business owners the exact steps they should take if they believe their business has been targeted.
MarkMonitor – This service offers tools specifically for protecting businesses from identity theft. Services include daily domain registration reporting, the ability to monitor hundreds of millions of emails per day and special client support managers for businesses.

Medical Identity Fraud

Medical Identity Fraud Alliance – The MIFA fights against medical identity fraud by advocating for key issues like modernizing health care cards and allocating more insurance company resources to prevent fraud. In addition to offering security tips for both consumers and providers of medical services, the MIFA also occasionally organizes events for its members.
U.S. Department of Health and Human Services – This official U.S. government resource provides an overview on how to protect medical information, how to watch out for common medical fraud schemes and how victims can report medical fraud. It includes official government helplines for American victims of medical identity fraud.
Coalition Against Insurance Fraud – This organization aims to give consumers the knowledge and power to fight back against many types of insurance fraud. It has a webpage dedicated to medical insurance fraud which discusses what criminals do with stolen medical information and the consequences faced by the victims. It also outlines how to go through the difficult process of correcting medical records and how to alert law enforcement authorities.

Child Identity Fraud

Out of Your Hands – This website provides unique resources aimed at educating children about identity theft in a fun way. Using games, dramatic skits and other entertaining activities, Out of Your Hands illustrates to children what makes up an identity, what kinds of information we store in common devices like phones and how a child’s own daily activities could be risky.
InternetMatters.org – This organization educates parents on how to recognize the signs that their child’s identity has been stolen. It also provides tools that help parents talk to their children about privacy and being careful with personal data. Parents have access to a specific list of actions they can take to make their children’s online environment more secure.

Determining If You Are at Risk of Having Data Stolen

There are many ways that sensitive information can get into the hands of identity thieves. The websites in this section explore common hacking methods, data breaches and risk factors that give fraudsters access to important data.

Hacking and Data Breaches

These resources describe the various ways that hackers get sensitive data:
Information Security Buzz – A website that provides free resources and training on keeping computer data safe from hackers. This page outlines and describes 10 of the most common methods used by hackers to steal data from individuals and businesses, including social engineering, password hacking and SQL injections.
World’s Biggest Data Breaches, by Information Is Beautiful – An interactive chart that lets users see the timeline of the biggest data breaches from 2004 to the present. The chart automatically categorizes breaches by number of records stolen, but users can change this and view by other metrics, like data sensitivity. Users can even filter results according to industry and method of leak.
DataBreachToday – A website that provides articles and guides on information security, privacy, fraud and data management. Specific coverage on data breaches includes insights on the latest threats, predictions about the evolution of cybersecurity and journalistic commentary on the politics of information security.

Common Identity Theft Risk Factors

The websites below highlight some common risk factors for identity theft, enabling users to determine if they themselves are in danger of being victimized:
The Identity Theft IQ Test – Offered by the Privacy Rights Clearinghouse, the Identity Theft IQ Test asks a variety of questions about data security, credit record awareness and computer usage – among other factors – in order to place users in one of three categories that describe their risk of falling victim to identity fraud.
Comparitech’s Guide to Identity Theft – In addition to answering common questions about who is at risk of identity theft, Comparitech’s identity theft guide provides research and tips on what services can be used to protect against identity theft.

Protecting Against Identity Fraud

Although anyone could become a victim of identity fraud, certain preventative measures make it more difficult for thieves to steal data. The resources below describe some of these measures, which include installing antivirus software, getting a VPN and subscribing to a data monitoring service:

Antivirus Software Resources

One of the most common ways that hackers get access to sensitive data is through viruses and malware installed on the computers of their unsuspecting victims. Installing antivirus software is one simple step computer users can take to prevent this type attack. Comparitech’s antivirus software overview enables users to evaluate what kinds of software may be best for them.
More details about specific antivirus software is provided in Comparitech reviews on programs such as Kaspersky Antivirus 2016, McAfee Antivirus Plus 2016 and AVG Antivirus (Free).

VPN Overview and Reviews

VPNs are great for protecting privacy online and preventing hackers from intercepting data, especially when using high-risk internet connections like public wifi. Comparitech’s VPN overview describes more benefits of VPNs and educates consumers on how to choose a provider.
Comparitech also offers reviews of providers like ExpressVPN, NordVPN and VyprVPN.

Data Monitoring Resources

There are a variety of services that alert users if their personal or business data is found in a place where it shouldn’t be. These data monitoring services regularly scan credit reports, criminal records, investment activity, and other online sources where personal details may pop up in the event of identity theft. These services include OwlDetect, ID Pro Guard and LifeLock.
For more information, Comparitech offers a guide that explores some of these services and others like them.

Credit Monitoring Resources

Although not as comprehensive as the services described above, credit reports can be used to monitor credit data only. Several credit report services offer specific advice on identity fraud:
Experian – A credit monitoring service for U.S. and UK consumers
Equifax – A credit monitoring service for U.S. and UK consumers
TransUnion – A credit monitoring service for U.S. consumers
Callcredit – A credit monitoring service for UK consumers

Resources to Consult If Your Identity Has Been Stolen

IDT911 – IDT911 offers comprehensive education and assistance for those whose identities have been stolen, including identity management, credit monitoring, response and remediation services, and cyber security consulting.
IdentityTheft.gov – An official U.S. government website that allows users to report if they have been victims of identity theft. It also provides victims with a personalized recovery plan based on the specific information they have provided. Users can even create accounts in order to receive step-by-step instructions on how to progress with their recovery plans, update plans with new information if required, and make use of pre-filled forms and letters.

from  https://www.comparitech.com/identity-theft-protection/identity-fraud-protection-resources/


No comments:

Post a Comment