Countdown of the top seven bad habits victims of malware attacks share

Pete Lindstrom, Contributor

In this podcast, security pro Pete Lindstrom counts down the top bad habits that victims of malware attacks share. Some are acts of omission -- for instance, failing to keep browser software updated or assuming that little yellow lock on your browser bar protects you from malware. Other common bad habits are consciously committed, such as turning off antivirus software, clicking on absolutely everything, or choosing a password that's easy to remember but also easy to guess.

Lindstrom's podcast offers much more than a scold: He has solid prescriptions, so you can change your evil online ways and quickly implement better habits. Resolve right now to be more secure in your 2014 online life, and follow Lindstrom's tips to avoid being a victim of Web-borne malware attacks.

Pete Lindstrom is principal of Spire Security, an industry analyst firm addressing challenges in technology risk management and cybersecurity economics. In his 20+ year career, Lindstrom has held other industry analyst positions at Burton Group and Hurwitz Group, as well as enterprise positions as a security architect and an IT auditor. Lindstrom honed his finance and technology (and rifleman!) skills in the United States Marine Corps.

View the next item in this Essential Guide: Web-borne malware Security School quiz or view the full guide: Keeping Web malware out of enterprise systems

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: