Top advice for securing your systems in 2019

Top advice for securing your systems in 2019

Take action to secure your passwords, containers, and more with these top articles from Opensource.com this year.

Image by : 

opensource.com

x

Get the newsletter

Join the 85,000 open source advocates who receive our giveaway alerts and article roundups.

It's been an interesting year for security and users. It all kicked off at the beginning of the year with Facebook and Cambridge Analytica causing people suddenly to think more seriously about their data and what they share on social media. In fact, the threat against personal data has been an important theme for the year. We've seen breaches at companies such as Marriott (in December) and British Airways (September) and Under Armour (March). What's interesting about these is that the criminals seem to be targeting all levels of the stack, from the enterprise backend to the web app to the mobile app on people's phones.

And once data is leaked, it will be put to use. There's been an enormous rise in extortion attempts based on account data allegedly used on "adult sites" and hijacked webcam footage. This brings us inexorably to cryptocurrencies. Besides being the payment method of choice for criminals, cryptocurrency has also suffered this year, with a $13.5 million wallet compromise at Bancor in July. Bitcoin has seen huge peaks and troughs as confidence in the currency has oscillated.

Another story that won't go away is hardware. Bloomberg Businessweek published a much-disputed story suggesting that a Chinese military agency convinced or forced Supermicro to insert tiny chips on motherboards for companies such as Apple and Amazon. Whether the story is true or not, it has opened people's minds to the realisation that we have less control over the supply chain than we thought we did. Alongside that was another realisation: chip-related security issues such as Meltdown and Spectre, which were revealed at the very beginning of January, are likely to be joined by a never-ending set of similar or related vulnerabilities that the average user has little capability to mitigate.

With all that said, we've had numerous articles on Opensource.com to help you secure your passwords, containers, and more.

Top 6 Opensource.com security articles of 2018

Lock

Here's how to quickly and easily reset a root password on Fedora, CentOS, and similar Linux distros.
Password

We all want our passwords to be safe and secure. To do that, many people turn to password...
Lock

42 answers to the big questions about life, the universe, and everything else about Security-...

Use these tools to build security testing into the software development process.
tree roots breaking through brick wall

Even smart admins can make bad decisions.
Password laptop

Do you ever feel you have more passwords than you can keep track of? It's probably more than just a...

About the author

Mike Bursell - I've been in and around Open Source since around 1997, and have been running (GNU) Linux as my main desktop at home and work since then: not always easy...  I'm a security bod and architect, and am currently employed as Chief Security Architect for Red Hat.  I have a blog - "Alice, Eve & Bob" - where I write (sometimes rather parenthetically) about security.  I live in the UK and...