Page 45 - index
P. 45








Don’t use vector-based company logos in PDFs available on your website. Vector-based
logos are made of paths, allowing them to be scaled to any size without a loss of quality.
Raster-based logos are made up of dots and quickly lose image quality if the size is
manipulated. A savvy adversary can lift a vector company logo out of a PDF and use it to forge
exact copies of your print letterhead, company emails and even company ID badges – anything
with your logo on it. By using raster logos (high compression JPEGs, PNGs, etc) this makes
forging your company materials more difficult.

Finally, Treat all your data as valuable. To a seasoned hacker on the hunt, data comes in two
types: data to exploit and data to steal (and sell). Even the most innocent information can be
parlayed into playing a role in cracking into your network. Take nothing for granted… and shred
everything once it has outlived its usefulness.



For more no-nonsense cybersecurity tips for the layman, check out Surviving The Zombie
Apocalypse: Safer Computing Tips for Small Business Managers and Everyday People.



About the Author:

Max Nomad is an IT Consultant, Graphic Designer, creative entrepreneur
and computer security researcher with over 20 years of experience using
Internet technology to assist (and protect) small businesses. Having worked
with everything from stock brokerage firms to car dealership chains to ostrich
farmers, his diverse client history has given him experience with a variety of
large and small business needs. He also writes candid and informative
essays focusing on publishing, graphic design and the underground side of
cybercrime. He lives in Virginia Beach, Virginia and can be reached at
[email protected].

















45 Cyber Warnings E-Magazine – July 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   40   41   42   43   44   45   46   47   48   49   50