Axelerant attempts to provide team members with the education and tools to maintain the security of company confidential and personal information. As security concerns evolve, awareness about secure methodologies will as well.

Avoid Phishing and Social Engineering

Social engineering is the most common attack vector used to compromise computer systems. Social engineering relies heavily on human interaction, often tricking people into breaking normal security procedures. The following is a brief reminder of some of the methods used but is incomplete.

Consider Disk Encryption and Storage Management

Most modern disks (SSDs) have built-in self-encrypting drive (SED) technology. Axelerant highly recommends SSDs for their increased speed and the hardware-based encryption (self-encrypting drive or "SED" technology) to protect the drive when the machine is off. This is particularly important for laptops that can be easily stolen. When you buy a new disk or configure a new laptop, turn on the disk encryption. Some of Axelerant's clients will demand it. (Contact your product manager to see if you are eligible for a hard disk rebate.)

Software Disk Encryption

If you haven't set up your hard drive with hardware encryption, you can use software alternatives until you get a new one. These methods incur a small performance penalty concerning hardware encryption but are relatively quick and easy to set up.

Mac OSX: FileVault 2

Open System Preferences, click the Security & Privacy icon, and switch to the FileVault tab. If you see a button that says "Turn Off FileVault..." then congratulations, your disk is already encrypted. Otherwise, click the lock icon in the bottom left to make changes, and click "Turn On FileVault...". Google "Filevault" for more information.

Much more technical detail on securing your Mac: macOS-Security-and-Privacy-GuideThis is useful but well beyond what is required by Axelerant.

Windows: BitLocker or DiskCryptor

To see if BitLocker is supported on your version of Windows, open up Windows Explorer, right-click on C drive, and see if you have a "Turn on BitLocker" option (if you see a "Manage BitLocker" option, then congratulations, your disk is already encrypted.) If you don't have BitLocker available, google the open-source DiskCryptor.

GNU/Linux: use the hardware

Unlike Mac and Windows, you can only encrypt your drive during system installation; you might as well buy a new SSD...

Backups

With more work captured in the cloud by Slack, Gmail, Google Drive, GitHub, etc., less needs to be backed up. But you won't know what you'll miss until your system doesn't boot up because of an unrecoverable hard drive (or SSD) error. At the least, back up your security keys and personal preferences directories, such as (examples in GNU/Linux):

Consider committing your personalization files (like ~/.bashrc) into a Git repository. Just make sure you do not commit any files containing private keys or passwords.

While it's preferable that you not back up any company or client-sensitive files or data, such data must be completely deleted from your machine(s) when you stop working for that client.

If you use any backup mechanism more complicated than simply copying the files to another medium, ensure that you know how to restore the files, too, as backups are worthless if you can't retrieve them.

Finally, there is no good reason not to make backups: a one-terabyte external USB drive costs less than $60 on Amazon.

Securely Delete Files and Wipe Disks

When you delete a file, it doesn't go away. Usually, all that occurs is the file name, and a pointer to its bits is removed from a directory listing. With the proper tools, deleted files can be recovered. For this reason, old disks must be securely wiped before being given or thrown away. Some pointers are given below:

GNU/Linux:

Mac OS X:

Erasing an entire disk:

Keep Your Systems Up-to-date

One of the best ways to protect yourself from being hacked (other than via a social engineering pathway) is to keep the software on your computers and phones up-to-date. Sometimes you may reasonably want to wait for a .1 or .2 release before updating after a new major release, but don't get far behind. Also, if you have a Windows machine, you must maintain an up-to-date anti-virus package.

Protect Your Privacy

Axelerant believes privacy is a right, and private communication can benefit the business. Here are some tips on how free and open source tools can help:

Secure your Laptop

The operating system and software applications on your laptop - and all computers, phones, tablets, etc., in your house - should be updated with new versions and security patches that ensure it presents a minimal attack surface to potential adversaries. 

Additionally, your laptop should lock (require a password to resume) on-screen close and after 15 minutes of idle time.

Sharing Online Service Accounts

Use Password Management Tools

A password manager will enable you to have unique, strong passwords for every service you log into. Good password managers will generate new passwords for you, auto-fill web forms, allow extra protection for high-security accounts (like banking), and more.

Please choose a password manager that encrypts locally (in your browser, so you don't have to trust the provider to keep their data safe) with iPhone and Android apps that will auto-sync with the manager.

At Axelerant, we currently recommend LastPass as it is the most full-featured, but we keep a close eye on the FOSS KeePass and Password Safe solutions.

LastPass

Disable Browser Password Autofill

LastPass provides secure password management, especially when unlocked via Two Factor Authentication. Storing new passwords created in LastPass in your browser completely defeats this security, enabling anyone to access your browser access to all your sites. If asked by your browser, "Do you want to save this password in your browser?" answer "No" Then disable this insecure action altogether:

Use Two Factor (or 2-Step) Authentication (TFA, 2FA)

Two-Factor Authentication includes something you know (e.g., your memorized password) and something you have (e.g., your smartphone or a Yubikey) and can greatly increase your security systems. Axelerant recommends you use Two-Factor Authentication for services that support it.

For example, as your password manager grows to have more passwords - not only Axelerant's systems and clients but also your personal bank accounts, credit cards, school records, etc. - it becomes increasingly important to have it protected by more than just a password.

Axelerant requires that its employees and contractors give access to the Axelerant Google Apps - that include Gmail, Hangouts, and Google Docs access - use Two-Factor Authentication on their Axelerant Google Account.

Two-Factor Authenticators

Many hardware and software tools exist for creating secure "one-time passwords" (OTP). Two that we frequently use internally are described below.

Please do not rely on SMS text messages for general two-factor authentication, as it is less secure than others listed here. However, at the time of this writing, setting up Two-Factor Authentication on your Google account initially requires SMS verification.

This is OK and serves as a "TFA Backup" mechanism; more at Two-Factor Redundancy and TFA Backup Codes.

Google Authenticator

Partial List of TFA Services

Two-Factor Redundancy and TFA Backup Codes

As a final, crucial step, you must have a backup second factor for all your TFA accounts. Imagine using Google Authenticator from your phone to unlock LastPass, and you lose your phone. Without a backup second factor, access to your accounts would be prevented. So you need a backup.

SMS can often be an easy backup, say for Google Authenticator. Services that provide TFA generally enable multiple two-factor options and a downloadable set of single-use "backup codes" that you can download or print and keep in a safe place. If you lost your primary second factor, you could use your secondary one or a printer backup code stored in your file cabinet. Hint: you can store backup codes in LastPass in the Notes section.

Advanced: Connecting to TFA-enabled Sevices/Apps

Some applications and services may need to connect to your Axelerant Google account, but they might not handle TFA. An example would be a personal Gmail account trying to send e-mails through your Axelerant account.

For this purpose, Google has created something called App PasswordsApp Passwords allows you to create a unique password for each of your services/apps. If this password is used while authenticating your service/app to access your Axelerant account, it will bypass TFA.

There are some instructions at https://support.google.com/accounts/answer/185833?hl=en on how to use App Passwords with Google. Several other TFA-enabled services also support app passwords -- see their respective documentation.