Guess what?
It’s October, and that means it’s Cybersecurity Awareness Month.
In the US, it’s a big enough deal to be officially known as National Cybersecurity Awareness Month (NCSAM), and it started back in 2004 as “a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online”.
In short, it’s not about pushing products, or crowing that your way of doing it is better than everyone else’s, or pulling off publicity stunts to promote a particular technology over all others.
For Naked Security, at least, it’s about presenting easily-digested articles that are plainly written, educational and, as far as possible, fun.
After all, computer security doesn’t have to be boring, doesn’t have to be awash in jargon, and doesn’t have to end up as a set of proscriptions and prohibitions.
So here are 3 simple steps to online safety that aren’t just clicking a button.
Each of these steps requires a little bit of commitment and some ongoing extra effort on your part…
…but although you might find them a hassle at first, we think you will soon consider them second nature.
The theme for Week 1 of NCSAM is STOP. THINK. CONNECT: Simple steps to online safety.
All our steps will quite literally make you STOP and THINK before you CONNECT, thus increasing your advantage over the cybercrooks.
#CYBERAWARE STEP 1
TRY 2FA WHEREVER YOU CAN
As you probably know, 2FA is short for two-factor authentication, also known as two-step verification or 2SV.
Typically, 2FA works by asking you for your regular password, which is the same every time, and then asking you for a one-time code that is calculated by, or sent as a text message to, your phone.
2FA isn’t foolproof – the crooks could steal your phone, booby-trap the code generation app using malware, or swap out your SIM card and intercept the messages – but it does make things harder for the crooks.
In particular, they can no longer steal your password today and use it again and again for hours, days or weeks.
The downside, and we’ll be honest here, is that 2FA isn’t as convenient as just using a password, at least for what you might consider your “less important” accounts that you use a lot.
If you leave your phone at home, you probably won’t be able to login from your laptop at the coffee shop.
Also, logging in takes a bit longer, every time, and there are more things to go wrong that could keep you out of your account.
So, 2FA is indeed a simple step to online safety, but it isn’t a one-off action: it adds an extra step to every login, so you have to change your login procees – what time management and user interface experts like to call “workflow”.
But we think the effort is worth it, and we encourage you to try 2FA wherever you can.
If you really can’t get on with it, you can always turn it off, but give it a fair go first.
#CYBERAWARE STEP 2
TRY THE LONGEST MOBILE PHONE LOCKCODE YOU CAN MANAGE
Back in 2015, Apple upped the shortest permitted lockcode for iPhones from four digits to six.
That’s because adding two digits doesn’t increase the number of different codes by 50% (6 digits / 4 digits = 1.5 = 150%), but takes you from 10×10×10×10 codes (10,000) to 106 (1 million), a 100-fold boost in complexity.
We suggest upping your lockcode even further, say to 10 digits, even though it’s harder to memorise to start with, and takes longer to type in every time.
Although 10-digit codes take 2.5 times longer to type in than 4-digit codes – let’s say close to three seconds instead of about one second – they are, at least in theory, a cool one million times more secure. (The arithmetic here is 10/4 = 2.5, but 1010/104 = 1,000,000.)
That means that it’s easier to pick something unique and hard to guess, and harder for crooks – or for your oh-so-witty friends who are dying to send out off-colour tweets in your name – to shoulder-surf by watching you typing in your code out of the corner of their eye.
We think the effort is worth it, and we encourage you to increase the length of your lockcode as much as you can.
If you’re worried about forgetting your new, superlong code and being faced with resetting your phone and losing any data you haven’t yet backed up, consider writing down the new code and locking it away at home until you’re happy you’ve mastered the new finger pattern.
#CYBERAWARE STEP 3
TRY LOGGING OUT FROM APPS YOU’RE NOT USING
Have you ever retweeted something without realising it, or Liked something on Facebook without meaning to?
Have you realised your blunder only when your friends started pestering you to find out when you adopted your new and uncharacteristic political opinions, or when you fell in love with a certain Mr J. Bieber? (Those are rhetorical questions. You don’t need to answer.)
The problem is that social networks put a lot of effort into what they call frictionlessness, so that it’s as easy as possible – and sometimes much too easy, especially when you are somewhat lubricated yourself – to participate in online discussions at a moment’s notice.
Ironically, you may find – if you have made more than your fair share of online faux pas – that you can make your social networking life a lot easier, or at least a lot less prone to blunders, by making its operation a bit more difficult.
We suggest learning how to log out fully from services such as Twitter and Facebook, especially on your phone, where simply closing the app is not enough.
It means logging back in every time you start up the app or load the website again, which is mildly annoying at first.
But it means you’ll be much less likely to share something unintentionally, which will not only protect your friends from scams apparently “approved” by you, but also protect you from what could turn into career-limiting moves.
We think the effort is worth it, and we encourage you to learn to logout regularly.
Admittedly, for all that this is a simple step in theory, it’s irritating to get right in practice, because each social media app seems to have its own way of handling the logout function, and it isn’t always obvious where to find it.
Try looking for a “hamburger menu” (see below) on your main account page, or follow your nose to setup pages labelled Settings
or Account
.
To give you a hint of where to start and where in each app to go digging, here’s how to do it in the iOS versions of Facebook and Twitter:
There you have it.
As we said above, you might consider these steps a bit of a hassle at first, but that we think you will soon consider them second nature.
In fact, you might soon find yourself uncomfortable without them, like driving without a seatbelt or riding without a helmet.
Remember: STOP. THINK. And only then CONNECT.
Roland Schmid (@r_u_schmid)
really simple steps to increase online security.
Laziness is our biggest enemy (at least my enemy).
John Knops
Yes Peter, you are right about 2 factor authorization. 2FA for those with limited messaging ability. I have considered it for my online banking. As one of the Luddites who has survived with a “telephone” unrecognizeable to anyone younger than 25 except as that quirky black or pink object on a desk or table and connected with an old mouse cord to a strange box on the wall somewhere beyond sight and beyond the reach of the 30 foot “extension” cord, I have not understood how the 2FA code is transmitted. Is it an electronic voice that says the numbers and letters which we have forgotten by the time we get to our desktop or laptop keyboard in the upstairs room?
Some of us don’t subscribe to “cell service” because the cost is prohibitive for our budget, being 2 or 3 times the cost of that 30 foot extension service with the round dialling feature. Or we live on the other side of the mountain where, even if we had the money, there is “no service”.
Can Sophos explain in simple Ludditese how 2FA works when you don’t have the latest overpriced communication technology called a cellphone which still sounds like something you use in the Tower or Riker in NY.
Paul Ducklin
I think you’ve come up with lots of reasons why you don’t want to buy a mobile phone (even though a $5 pre-paid mobile is enough – you don’t need the “latest overpriced” model – and in most countries you don’t even need credit to receive calls or texts).
Some phone-based 2FA systems will place voice calls, instead of using text messages. They read out the code, so they work fine with landlines (by the way, in the UK, the line rental alone for my landline, which I need solely to get a VDSL internet service, costs about 3x as much as my wife’s entire mobile phone bill).
If you can’t get your laptop close enough to the phone to type in the code, you could try writing it down – it is only valid once so there is no harm in transcribing it. Or try typing it into a calculator and then taking the calculator upstairs. Or get a cordless phone that works upstairs. Or get the phone company to install an extension socket.
Lots of ways to solve your problem.
delayedthoughtengineering
You can look into using Google Voice to forward a random number to your phone. Even better, if you look into it, I think Google Voice can translate SMS into an e-mail.
Robyn
Thank you Paul. I already use 2FA when available and I just extended my passcode to 6.
Anonymous
Hmmmm…that’s a good start, but remember that 6 is already the new 4.
(IIRC an old iPhone that was upgraded could keep a 4-digit code but if you have a new phone or you reflash and reinstall iOS on an old one, you have to start at 6.)
Can we persuade you to go longer still? If 10 feels excessive then how about 8 :-)
Claire Annette Reed
Good stuff, Mr. Ducklin.
I have been using 2FA for my online banking for about five years now. The analogy I use is it’s like tying your shoe – seems really complicated at first, then eventually you don’t even think about it while you’re doing it.
Another tip for pass codes – re-use numbers so someone can’t determine the digits and length you use by viewing the screen at an angle (i.e. 166233 instead of 1623).
Perhaps a primer on tokenized payments later this month? Still not horribly trendy, but hopefully gaining momentum.