Friday, 21 August 2015

PREVENTIVE MEASURES AGAINST CYBER ATTACKS AND THREATS



 
It is no longer news that the world is going into digitalization with the advancement of technology. Cyber threats and attacks are now on the increase. These criminals have become more aggressive, more sophisticated, determined and more ruthless than ever in their attempts to exploit the internet confraternity for ill gains, which in the long run will backfire because he who kills by the gun will surely die by the gun.

There is, however, plenty that individuals and organizations can do to monitor and limit attackers’ impact. When it comes to businesses and their websites, adequate security measures and implementations are all that counts in avoiding total financial and reputational ruin.

Protect Yourself
Use the latest Internet security program for maximum protection against malicious code and threats. The program should have capabilities that includes: ­
­
Antivirus and behavioral malware prevention that prevent unknown malicious threats from blowing off and causing harm on your computer;
­
Bi-directional firewalls that will block malware from exploiting potentially vulnerable applications and services running on your computer;
­
­Browser protection to protect against obfuscated web-based  attacks. 

­
Use reputation-based tools that check the reputation and trust of a file and website before downloading, and that check URL (web address) reputations and provide safety ratings for websites found through search engines;

Update the System Regularly
Keep your system, programs, and virus definitions up-to-date and always accept updates requested by the merchant (owner of the program) for download and install the update (you can set it at “automatically download and install updates”). Running out-of-date versions of any program or software can put you at risk from being exploited by cyber criminals. 

Only download updates from merchant sites directly to prevent malicious software or program download. Select automatic updates wherever possible on your computer. Be suspicious of warnings that pop-up on your browser or system asking you to install media players, document viewers, security updates, etc.

Be Wary of Scareware Tactics
Versions of software that claim to be free, cracked or pirated
can expose you to malware, or social engineering attacks that
attempt to trick you into thinking your computer is infected and
getting you to pay money to have it removed. Or offer to fix your computer by downloading the software or giving some sensitive information about you or your computer. Be wary of these tactics.

Use an Effective Password Policy
Password is the front door against attackers, so if your door is not well mounted and strong, it can be broken into. Ensure that your passwords are a mix of letters (uppercase and lowercase), numbers and symbols, and change them often, most especially when you suspect an unusual activity on your account. Passwords should not consist of words from the dictionary. It should not be something you share often with friends, or words that can easily be guess.  Do not use the same password for multiple applications or websites.

Think Before You Click
Never view, open, or copy email attachments to your desktop or
execute any email attachment unless you expect it and trust the
sender or source. Even when receiving email attachments from trusted users, be suspicious. And never you download or click on any link on an email you receive bearing “undisclosed recipient” in the recipient column. It might be a time bomb waiting to be detonated on your system. 

­
Be cautious when clicking on URLs in emails or social media
Communications like post, comment, and what have you, even when coming from trusted sources and friends. Check very well before you click. Do not blindly click on shortened URLs, e.g http://bitly.a2-zwa14.com  without expanding them first using a preview tool or plug-in.
­

Use a web browser plug-in or URL reputation site that shows the reputation and safety rating of websites before visiting. Be wary of search engine results; only click through to trusted sources when conducting researches, especially on topics that are hot in the media.

­
Guard Your Personal Data
Limit the amount of personal information and files you make publicly available on public domain (in particular via social networks). This includes personal and financial information, such as bank logins, birth dates or any data that might render you vulnerable to attacks.

­
Review your bank, credit card, and credit information frequently for irregular activity. Avoid banking or shopping online from public computers (such as libraries, Internet cafes, and similar establishments) or from unencrypted Wi-Fi connections. Be watchful of the people around you when in a public cyber café, make sure they are not snooping on what you are doing on the computer.

­
Use HTTPS (not www) when connecting via public Wi-Fi networks to your email, social media and sharing websites. Check the settings and preferences of the applications and websites you are using. Look for the green browser address bar, HTTPS, and recognizable trust marks when you visit websites where you log in or share any personal information. The green colour web address indicates that the connections is encrypted and secure, and look out for a padlock bar icon on any website you are making transactions to be sure that the connection is safe and secure. See image below.
Configure your home Wi-Fi network for strong authentication and always require a unique password for access to it.

No comments:

Post a Comment