{"id":176732,"date":"2015-12-23T16:19:17","date_gmt":"2015-12-23T16:19:17","guid":{"rendered":"http:\/\/4cd.e16.myftpupload.com\/?p=176732"},"modified":"2015-12-23T16:27:03","modified_gmt":"2015-12-23T16:27:03","slug":"how-to-have-yourself-a-merry-cyber-safe-christmas","status":"publish","type":"post","link":"https:\/\/citifmonline.com\/2015\/12\/how-to-have-yourself-a-merry-cyber-safe-christmas\/","title":{"rendered":"How to have yourself a merry cyber-safe Christmas"},"content":{"rendered":"
In 2000, Scott Culp wrote a terrific essay on computer security.<\/p>\n
It was entitled the 10 Immutable Laws Of Security.<\/p>\n
Fifteen years is a long time in cybersecurity, so it seemed like a good time to revisit these “laws” and put them in the a context you might encounter this Christmas – a time when there’s often a spike in attacks.<\/p>\n
Observing them could prevent a festive season you’d rather forget.<\/p>\n
Rule 1: If a bad guy can persuade you to run his program on your computer, it’s not your computer anymore<\/strong><\/p>\n