October is National Cyber Security Awareness Month
Cyber security awareness is so important, and we’re going to display a few things you should be aware of this month, for you to try to make capable changes to your personal or business security perspective. You will notice some of the information below is linked to different posts here on the blog. This should help you understand each topic better! Please don’t be afraid to use each of the links below to learn more about protecting your system(s).
- Email is one of the biggest attack methods. Since users are still highly dependent on email, it is so critical that email systems get fixed. Spam can be so cunning that it may disguise itself as your friend, someone you trust, or a bank. The main target in these spam attacks is phishing, which will allow an attacker to trick you into doing something or giving away personally identifiable information.The goal is to also download malware on to your computer, which can be used to take control of your computer and steal much more personal information. Some emails may claim to be a legitimate organization sending you an attachment, but it’s purpose is to distributed malware on your computer. It is best to secure email systems against spam. This can be done using a variety of products whether hardware or software. Make sure to secure your system(s) with the latest spam fighting utilities. Also, securing Outlook or Windows Live Mail is beneficial.
- Instant Messaging still seems to be a vector for malware attacks. Just when people drop their guard about IM security, a new band of threats affects users. Most IM attacks come in the form of spam, a message from an apparent trusted friend, or a phishing attempt/scam from a legitimate looking company. A lot of the time, when the message appears from a trusted friend, it usually means that person’s IM account or email account has been hacked and the attacker has mined the email addresses or IM addresses in order to send you these attacks. It is important to have a good Internet Security product that protects against IM attacks along with network defense.
- Exploits are the most common cause of infections on computers these days. Many of the exploits have been caused by out-of-date Java plugins or Adobe Flash Player plugins (or even fake Flash Player), among other types of plugins for your browser. Other exploits come in the form of advertisements that are catered to your interests, by the use of tracking cookies, which when you click on the ads it can lead to a site that will immediately download malware and attempt to take control of your computer.Those are just a couple of examples of why you need Internet Security protection as declared just above in the explanation for IM security. Also, having a second-opinion malware scanner can make sure that things don’t get missed, giving you maximum protection. Working on a defense-in-depth strategy for your computer can be a great way to avoid exploits.
- Downloading and installing untrusted software products is a good way to get infected with viruses, spyware, and other threats and malware. Using tools such as Web-of-Trust for your browsers is a key idea in managing whether a site is safe. Also, reading reviews for the product you are getting ready to download and purchase will help you make an informed decision. It is important to have Total Internet Security protection, as stated above in IM security. Please refer to the “Internet Security product” link for more information on securing your system(s) with protection mechanisms.
There are many more vectors of cyber security problems. It is important to use the methods described above as well to secure your system(s) from attacks from cybercriminals.
Summary of mitigating most attacks:
- Have a good antivirus or internet security product for maximum protection against malware, exploits, etc.
- Have a defense-in-depth PC strategy to help secure your system(s) against malware and exploits, among other threats.
- Keep abreast of the latest malware threats, so you know the seriousness of securing the system(s).
- Having a second-opinion malware scanner is not a bad idea to help secure even further against malware and exploits.
- Watch out for fake bank emails, so you can keep your financial information very safe!!
- Avoid digital disasters by backing up your data on to an external drive, CD/DVD, etc. Using a backup solution can mitigate this problem (especially for businesses).
- Always maintain a good password on any online account, especially social networks and banks!
Tags: Adobe Flash Player, adware, Business, Computer security, Cybercrime, Cyberwar, Data backup, defense in depth, digital disasters, drive-by download, email, Exploits, Identity Protection, IM security, IM spam, Instant Messaging, Internet safety, Internet Security, Internet Security Protection, LifeLock, Malware, National Cyber Security Alliance, National Cyber Security Awareness Month, October 2012, Password security, Personal, Personally identifiable information, Plugins, Rootkits, Scam, Second-opinion malware scanner, Security, social engineering, social networking, Spam, Spyware, United States Department of Homeland Security, Untrusted software, Viruses, Vulnerability, Windows Live Mail
About Jay PfoutzMarketer
Error: Twitter did not respond. Please wait a few minutes and refresh this page.