It is no longer news that the world
is going into digitalization with the advancement of technology. Cyber threats
and attacks are now on the increase. These criminals have become more
aggressive, more sophisticated, determined and more ruthless than ever in their
attempts to exploit the internet confraternity for ill gains, which in the long
run will backfire because he who kills by the gun will surely die by the gun.
There is, however, plenty that
individuals and organizations can do to monitor and limit attackers’ impact. When
it comes to businesses and their websites, adequate security measures and implementations
are all that counts in avoiding total financial and reputational ruin.
Protect
Yourself
Use the latest Internet security
program for maximum protection against malicious code and threats. The program
should have capabilities that includes:
Antivirus and behavioral malware prevention that prevent unknown malicious threats from blowing
off and causing harm on your computer;
Bi-directional firewalls that will block malware from exploiting potentially
vulnerable applications and services running on your computer;
Browser
protection to protect against obfuscated
web-based attacks.
Use reputation-based tools that
check the reputation and trust of a file and website before downloading, and
that check URL (web address) reputations and provide safety ratings for
websites found through search engines;
Update
the System Regularly
Keep your system, programs, and
virus definitions up-to-date and always accept updates requested by the merchant
(owner of the program) for download and install the update (you can set it at “automatically
download and install updates”). Running out-of-date versions of any program or
software can put you at risk from being exploited by cyber criminals.
Only
download updates from merchant sites directly to prevent malicious software or
program download. Select automatic updates wherever possible on your computer. Be
suspicious of warnings that pop-up on your browser or system asking you to
install media players, document viewers, security updates, etc.
Be
Wary of Scareware Tactics
Versions of software that claim to
be free, cracked or pirated
can expose you to malware, or social
engineering attacks that
attempt to trick you into thinking
your computer is infected and
getting you to pay money to have it
removed. Or offer to fix your computer by downloading the software or giving
some sensitive information about you or your computer. Be wary of these
tactics.
Use
an Effective Password Policy
Password is the front door against
attackers, so if your door is not well mounted and strong, it can be broken
into. Ensure that your passwords are a mix of letters (uppercase and
lowercase), numbers and symbols, and change them often, most especially when
you suspect an unusual activity on your account. Passwords should not consist
of words from the dictionary. It should not be something you share often with
friends, or words that can easily be guess. Do not use the same password for multiple
applications or websites.
Think
Before You Click
Never view, open, or copy email
attachments to your desktop or
execute any email attachment unless
you expect it and trust the
sender or source. Even when
receiving email attachments from trusted users, be suspicious. And never you
download or click on any link on an email you receive bearing “undisclosed
recipient” in the recipient column. It might be a time bomb waiting to be
detonated on your system.
Be cautious when clicking on URLs in
emails or social media
Communications like post, comment,
and what have you, even when coming from trusted sources and friends. Check
very well before you click. Do not blindly click on shortened URLs, e.g http://bitly.a2-zwa14.com without expanding them
first using a preview tool or plug-in.
Use a web browser plug-in or URL
reputation site that shows the reputation and safety rating of websites before
visiting. Be wary of search engine results; only click through to trusted
sources when conducting researches, especially on topics that are hot in the
media.
Guard
Your Personal Data
Limit the amount of personal
information and files you make publicly available on public domain (in
particular via social networks). This includes personal and financial
information, such as bank logins, birth dates or any data that might render you
vulnerable to attacks.
Review your bank, credit card, and
credit information frequently for irregular activity. Avoid banking or shopping
online from public computers (such as libraries, Internet cafes, and similar
establishments) or from unencrypted Wi-Fi connections. Be watchful of the
people around you when in a public cyber café, make sure they are not snooping
on what you are doing on the computer.
Use HTTPS (not www) when connecting
via public Wi-Fi networks to your email, social media and sharing websites.
Check the settings and preferences of the applications and websites you are
using. Look for the green browser address bar, HTTPS, and recognizable trust
marks when you visit websites where you log in or share any personal
information. The green colour web address indicates that the connections is
encrypted and secure, and look out for a padlock bar icon on any website you
are making transactions to be sure that the connection is safe and secure. See image
below.
Configure your home Wi-Fi network for strong
authentication and always require a unique password for access to it.
No comments:
Post a Comment