{"id":348,"date":"2007-08-03T23:54:38","date_gmt":"2007-08-04T04:54:38","guid":{"rendered":"http:\/\/www.trustyetc.com\/trustyblog\/2007\/08\/03\/efficiency-tip-101-security\/"},"modified":"2015-05-14T09:12:26","modified_gmt":"2015-05-14T14:12:26","slug":"efficiency-tip-101-security","status":"publish","type":"post","link":"https:\/\/www.trustyetc.com\/trustyblog\/2007\/08\/03\/efficiency-tip-101-security\/","title":{"rendered":"Efficiency Tip #101 &#8211; Security"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" align=\"right\" width=\"240\" src=\"http:\/\/farm1.static.flickr.com\/173\/403564666_5ee6397a41_m.jpg\" height=\"180\" style=\"width: 240px; height: 180px\" \/>I&#8217;ve decided that a hundred efficiency tips is enough to make most computer users efficient.\u00a0 There are undoubtedly a few that I have left out.\u00a0 I&#8217;ll add new ones as time goes on, but I need to start a new thing right now.<\/p>\n<p>\u00a0I would like to finish for now with something that really doesn&#8217;t save you time.\u00a0 Security costs you extra time, but that extra time is worth the effort.<\/p>\n<p>Computer security starts with a good password and a system that doesn&#8217;t automatically log you on at startup.\u00a0 I talked about <a target=\"_blank\" href=\"http:\/\/www.trustyetc.com\/trustyblog\/2007\/07\/15\/efficiency-tip-82-auto-login\/\">auto-login<\/a> a few weeks ago.\u00a0 This can save you a few seconds every time you turn your computer on, but in an office where other people have access to your computer it can cost you your data.\u00a0 I once had a teacher ask me if it were possible for the network administrator to &#8220;get into&#8221; her personal laptop and &#8220;see&#8221; her data.\u00a0 I booted her computer and it did an auto-login.\u00a0 At that point, I said anyone that could physically touch her computer could get all her data.<\/p>\n<p>If your computer never leaves your house and you have locks on your doors, an auto-login is probably safe.\u00a0 I have lots of kids walking around my house so I don&#8217;t have auto-login enabled.<\/p>\n<p>I talked about <a target=\"_blank\" href=\"http:\/\/www.trustyetc.com\/trustyblog\/2007\/03\/26\/passwords\/\">passwords<\/a> last spring.\u00a0 Using\u00a0&#8220;strong&#8221; passwords will keep your data safe.\u00a0 Strong passwords take longer to type, but the time is worth it.\u00a0<\/p>\n<p>I also encrypt all my portable data using <a target=\"_blank\" href=\"http:\/\/www.truecrypt.org\/\">TrueCrypt<\/a>.\u00a0 If you keep sensitive data on a portable device (person information, grades, trade secrets), you should encrypt that data.\u00a0 If you ever lose your USB drive, you won&#8217;t have to worry about anything except the cost of replacing the media.\u00a0 Encryption would have prevented the whole fiasco with the backup tape stolen from an Ohio\u00a0<a target=\"_blank\" href=\"http:\/\/governor.ohio.gov\/News\/June2007\/News61507\/tabid\/308\/Default.aspx\">intern&#8217;s car<\/a>.\u00a0 Now it is going to cost the state of Ohio millions of dollars to protect those affected\u00a0from identity theft.<\/p>\n<p>Encryption takes more time, but it is worth it.<\/p>\n<p>My friend, Mike, sent me this link.<\/p>\n<p><a href=\"http:\/\/blogs.techrepublic.com.com\/tech-news\/?p=907\">http:\/\/blogs.techrepublic.com.com\/tech-news\/?p=907<\/a><\/p>\n<p>It&#8217;s a story about a\u00a0guy that was kidnapped and tortured by people that wanted his password.\u00a0 The\u00a0victim didn&#8217;t work for the government.\u00a0 He didn&#8217;t know trade secrets.\u00a0 He was the world leader in an online game and his captors wanted to sell his account to the highest bidder.\u00a0 After five hours of holding a gun to his head, they could not get him to surrender his password.<\/p>\n<p>I don&#8217;t recommend putting your life in jeopardy to protect your passwords.\u00a0 An arm or a leg is the limit for me.<\/p>\n<p>TSPY= -2.07<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;ve decided that a hundred efficiency tips is enough to make most computer users efficient.\u00a0 There are undoubtedly a few that I have left out.\u00a0 I&#8217;ll add new ones as time goes on, but I need to start a new &hellip; <a href=\"https:\/\/www.trustyetc.com\/trustyblog\/2007\/08\/03\/efficiency-tip-101-security\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,4],"tags":[336,338],"class_list":["post-348","post","type-post","status-publish","format-standard","hentry","category-edtech","category-efficiency","tag-edtech","tag-efficiency"],"_links":{"self":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts\/348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/comments?post=348"}],"version-history":[{"count":1,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts\/348\/revisions"}],"predecessor-version":[{"id":1414,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts\/348\/revisions\/1414"}],"wp:attachment":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/media?parent=348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/categories?post=348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/tags?post=348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}