    {"id":253,"date":"2016-04-05T07:27:12","date_gmt":"2016-04-05T07:27:12","guid":{"rendered":"http:\/\/student-activity.binus.ac.id\/csc\/?p=253"},"modified":"2016-04-05T07:27:34","modified_gmt":"2016-04-05T07:27:34","slug":"cyber-hygiene-keeping-your-devices-clean","status":"publish","type":"post","link":"https:\/\/student-activity.binus.ac.id\/csc\/2016\/04\/cyber-hygiene-keeping-your-devices-clean\/","title":{"rendered":"Cyber Hygiene \u2013 Keeping Your Devices Clean"},"content":{"rendered":"<div class=\"content-list-component mt-paragraph text\">\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-254\" src=\"http:\/\/student-activity.binus.ac.id\/csc\/wp-content\/uploads\/sites\/37\/2016\/04\/2015-10-01-1443716801-8280042-cyberhygiene-thumb.jpg\" alt=\"close up of desktop computer keyboard an dhands with gloves\" width=\"570\" height=\"297\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Today we focus on cyber hygiene.<\/p>\n<\/div>\n<div class=\"content-list-component mt-paragraph text\">\n<p>We\u2019d like to take the credit for coining the phrase, but we didn\u2019t, but we use it a good deal. According to the Collins Online Dictionary notes: <em>\u201cCyber hygiene refers to steps that computer users can take to improve their cybersecurity and better protect themselves online.\u201d<\/em><\/p>\n<div class=\"post-content-bd\">\n<div class=\"entry__content js-entry-content\">\n<div class=\"entry__body js-entry-body\">\n<div class=\"content-list-component mt-paragraph text\">\n<p><strong>Practice good cyber hygiene with devices:<br \/>\n<\/strong><br \/>\nPC, laptop, smartphone, tablet, etc., any digital memory device be it an external hard drive, USB stick, smart-card memory chip, or compact disc, disable the auto-run feature for your device. Why? With auto-run enabled, any executable file (read<a href=\"https:\/\/www.staysafeonline.org\/stay-safe-online\/keep-a-clean-machine\/malware-and-botnets\" target=\"_hplink\">malware\/virus program<\/a>) will automatically begin running, and your device will become infected. What you want to do is have your antivirus software program inspect the external data source <em>before<\/em> you allow it to run an executable file so as to detect and neutralize any virus.<\/p>\n<\/div>\n<div class=\"content-list-component mt-paragraph text\">\n<p>You might be thinking, well I only use new digital memory devices \u2014 which is what IBM thought in 2010 when they handed out USB sticks to delegates attending the Australia CERT (Computer Emergency Response Team) security conference which contained malware. (Read the letter <a href=\"http:\/\/beastorbuddha.com\/2010\/05\/21\/ibm-letter-to-auscert-delegates-free-malware-giveaway\/\" target=\"_hplink\">IBM sent to the delegates of the AusCERT<\/a>where they used devices which came infected from the manufacturer.)<\/p>\n<\/div>\n<div class=\"content-list-component mt-paragraph text\">\n<p>How often do you receive a CD or a USB from friends or family with something of interest? If you simply drop the CD into the drive or stick the USB stick into the slot and run, you are entrusting the security of the device to the security protocols used by that friend or family member.<\/p>\n<\/div>\n<div class=\"content-list-component mt-paragraph text\">\n<p>Like the pureness of Ivory Soap, 99.44 percent of the time there is nothing there, but why take the chance?<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<div class=\"content-list-component mt-paragraph text\"><\/div>\n<p>&nbsp;<\/p>\n<div class=\"content-list-component mt-paragraph text\">\n<p><em>This article by Christopher Burgess is crossposted from <a href=\"http:\/\/www.senioronlinesafety.com\/cyber-hygiene-is-your-responsibility\/\" target=\"_hplink\">Senior Online Safety<\/a> with permission.<\/em><\/p>\n<p><em>Sumber :\u00a0http:\/\/www.huffingtonpost.com\/christopher-burgess\/<\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<footer>\n<div class=\"cf\"><\/div>\n<div class=\"post-tags-bd\"><\/div>\n<\/footer>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; &nbsp; Today we focus on cyber hygiene. We\u2019d like to take the credit for coining the phrase, but we didn\u2019t, but we use it a good deal. According to the Collins Online Dictionary notes: \u201cCyber hygiene refers to steps that computer users can take to improve their cybersecurity and better protect themselves online.\u201d [&hellip;]<\/p>\n","protected":false},"author":42,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,5],"tags":[],"class_list":["post-253","post","type-post","status-publish","format-standard","hentry","category-articles","category-news"],"_links":{"self":[{"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/posts\/253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/comments?post=253"}],"version-history":[{"count":1,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/posts\/253\/revisions"}],"predecessor-version":[{"id":256,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/posts\/253\/revisions\/256"}],"wp:attachment":[{"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/media?parent=253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/categories?post=253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/tags?post=253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}