Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Are you tired of that acquaintance who keeps bugging you with
computer questions? Do you avoid visiting certain people because
you know you will spend most of the evening cleaning up their
machine?
My uncle Bob is one of those people. He’s a nice guy, but with
computers, he’s not just an accident waiting to happen—he’s an
accident waiting to become a catastrophe. To keep Uncle Bob’s
computer safe without blowing up the Internet, we need to give
him the simplest of instructions that result in protecting him
against as much as possible. Uncle Bob needs a lazy person’s
guide to cybersecurity.
It’s not that Uncle Bob is lazy. It’s that he’s overwhelmed by the
amount of stuff he has to do to keep his data and devices secure.
Multiple passwords, reading through EULAs, website cookies that
he clicks “agree” to without really paying attention—they’re
giving him a serious case of security fatigue. And as his helper,
you’re probably pretty over it, too.
The funny thing is, with adequate cybersecurity, Uncle Bob’s—
and by extension all of our—problems would be much less
frequent and less severe. So, let’s see if we can work out a system
of minimum effort that renders reasonable results.
Before we begin, we will should note that lazy cybersecurity
should not apply to devices used to store sensitive data, conduct
financial transactions, or communicate confidential or
proprietary information. Lazy security is a good way to protect
those who prefer to do nothing rather than be overwhelmed by
50 somethings, but it shouldn’t have severe consequences if it
goes wrong.
User education