This chapter has introduced you to the various elements of security, including vulnerabilities, threats, exploits, and risks that could potentially affect an unprepared or underprepared SOHO installation. But how do you know what you should protect your system against? You could attempt to protect your system from each and every type of malware and cyberattacks, but that could be expensive and drastically alter how you use your system. The only truly “safe” computer is locked in a closet with the lock on the inside and no electrical power source.
Fortunately, several websites work to provide you with as-current-as-possible information on the most active threats from malware and attacks. These sites maintain lists, analyze the most common threats, or present maps that track attacks, some in real-time. Figure 2-8 shows a screen capture of the Microsoft Global threat activity map, but there are several others from other security companies:
Kaspersky’s threat map (https://cybermap.kaspersky.com/)
Deteque’s bot-net map (https://www.deteque.com/live-threat-map/)
Bitdefender’s real-time attack map (https://threatmap.bitdefender.com/)
A threat map, even those that claim to be real-time, depends on data it receives from a variety of sources and is only as accurate as the data it receives. A threat map is not something you can use in designing a security plan for your system, but it can tell you a bit about the threats currently active and perhaps should be considered when protecting your system.