Simple Cybersecurity Measures Even Mark Zuckerberg Uses

Blog Date:  7/1/2016
Author:  Ray Coulombe

Recently, a photo of Mark Zuckerberg sitting at his desk at work went viral after a keen-eyed Twitter user pointed out that Zuckerberg had taped over his laptop’s microphone jack and camera. While you may laugh, the Facebook creator isn’t so far off base.

Covering audio and video portals on your laptop is a simple, cheap, and effective safeguard for hackers. Alternatively, you can disable your computer or laptop’s camera and microphone when you’re not using them if you prefer to not use tape. This setting is generally found in the general system settings on your machine.

Here are a few other security measure to keep in mind when using a computer:

  • If you do choose to tape over the camera, make sure you protect the lens from the sticky adhesive.
  • Be sure to employ a decent anti-malware program and run regular scans on your machine.
  • Don’t click on any link you don’t absolutely trust, even if it’s from your mom. Some email programs will automatically scan links and attachments for viruses. Don’t ignore these warnings!
  • Flash is a known means to channel malware into your computer. Consider disabling Flash plug-in on your browser. Consider the No Script utility if you’re using Firefox.
  • Use strong, unique passwords for everything. A safe password manager program like LastPass or DashLane will not only mange your passwords, but generate them for you up to 100 characters. And they’re all encrypted.

    Generally, be smart and always be aware of unfamiliar or fishy-looking websites, pop-ups, or hyperlinks on the internet. If it’s good enough for Mark Zuckerberg, it’s good enough for you!


  • Resource Blogs

    Most Recent Blog List for Blog Author: Ray Coulombe

    Security Specifier Blog List Image for  Stay Safe! While Traveling This Summer

    Stay Safe! While Traveling This Summer

    It’s summer vacation time! The last thing you need to worry about it is getting your identity stolen while you’re sitting on a beach somewhere exotic. In 2016, more than 15 million Americans were victims of identity theft, up 16 percent from the previous year, according to Experian. Plus, about 33 percent of that fraud took place when people were traveling. Here’s a few tips to staying safe all summer while traveling...
    read more -->

    Security Specifier Blog List Image for Rethinking Cabling

    Rethinking Cabling

    Cat 5e became an ANSI/TIA/EIA standard in 2001, Cat 6 in 2002, and Cat 6a in 2008. However, it may be extremely useful to consider taking advantage of other existing cabling infrastructure in lieu of running new. Read more to learn how to approach cabling.
    read more -->

    Security Specifier Blog List Image for Off the Beaten Path at ISC West

    Off the Beaten Path at ISC West

    This year at ISC (the International Security Conference and Exposition), I was determined to try to see the latest iStechnologies hiding in the nooks and crannies—literally! I visited booths in the back, the basement, small kiosks hidden inside larger vendor books, and throughout the Emerging Technology Zone.

    In case you missed the show, I’ll round up some of the best new technologies and companies to keep an eye on. Read more.
    read more -->

    Security Specifier Blog List Image for Cyber Crime Taking Down Cities

    Cyber Crime Taking Down Cities

    Earlier this year, in March, the City of Atlanta’s nearly 8,000 employees heard words they never thought they would hear: “It’s okay to turn your computers on.” Their computers were powered off for five days. In those five days Atlanta residents could not pay traffic tickets, water bills, or report city issues. Read how ransomware impacted this metropolitan area.
    read more -->

    Security Specifier Blog List Image for A Few Thoughts on K-12 School Security

    A Few Thoughts on K-12 School Security

    There is no one size fits all when it comes to K-12 school security. Schools vary in so many ways: size, age, local environment, affluence, culture, governance, and more. Read some helpful tips and resources that might just help your school be better prepared.
    read more -->

    Copyright Ⓒ 2010 SecuritySpecifiers™