8 Little-known Cyber Security Tips You Can’t Afford to Ignore
July 14, 2016 — Cyber-Security, Rishabh Gupta, Salute India
It becomes very easy to work on the internet, but at the same time it brings lots of difficulties as well. Every organization today is using the internet to save time and store their confidential data online. Nowadays, to save data from being stolen, the need for cyber security arises which starts with the individual’s security from the internet.
Cyber Security is important for protecting laptops, programs, payment information, personal details, bank accounts, customer & client information and networks from damages, attacks or unauthorized access.
Cyber security is a broad term that covers the different measures that defend computers and networks from mischief. The necessity for security stems from the keystroke logging programs, virus threats, and spyware that exist today. To know more about computer security, here are some of the popular cyber-crimes you should know.
1. Phishing: It is a basic kind of attack. The attacker will make a user visit the website and the site will ask for a password, username, credit card details and so on. Phishing is a way to get the important information for malicious reasons or masquerading.
The best way to secure yourself from phishing attack is to never enter a right password on the first attempt. Always check the link of the site in the browser. If possible, Google the website link. HTTPS links are secured so never input the credit card details without checking the SSL certificate in the browser.
2. Cyber Stalking: It is a crime in which the stalker harasses a person with the help of email, messaging or online discussion groups. Cyberstalker anonymously stalks the person. It is not same as spamming because spammer targets many recipients but stalker targets a specific victim. Stalker encourages others to harass the victim, imposes false victimization and posts the defamatory and derogatory statements. The best way to guard against cyber stalking is to stay anonymous. Use primary email for trusted contacts only and for other communications use email with an anonymous name. Your online name must be gender neutral and make it different from your original name.
3. Espionage: In this the information of any organization or any individual is used unofficially. Its main aim is to spy, practice by the government for the purpose of spying.
Importance of Smartphone Security-
Smartphones and other mobile devices can be at high risk to cyber-attacks and other bullying acts. Today’s smartphones have the ability to do so much more than the what a normal mobile phone used to do a few years ago – but this intensely extended range of potentials has also observed the possibilities of some security risks.
Today, everyone is using their phones for a much wider range of activities – from online shopping to social networking, online banking, paying bills and surfing the web – we all have to take sensible safety measure to make sure our phones and our sensitive information are kept safe from cyber criminals and malware attacks.
Here are 8 Cyber Security Tips to Stay Safe and Secure
Cyber-attacks are a big problem for companies large and small. These are some tips for securing the sensitive information from attackers.
Tip 1. Regularly evaluate responsibilities and access to sensitive data. Always verify 3rd-party access and security.
Fact: Most frequent form of insider misuse is privilege abuse. More than 80% of the 11,000 incidents are reported regarding it.So monitor and verify privileged use.
Tip 2. Apply encryptions to PCs and USB drives and encourage the employees to keep devices with them. Enable Auto-update to the3rd party add-ons such as Acrobat, Java, and Flash as these are the common malware infection vectors.
Fact: Data on a personal computer and removable storage is most at risk (47%).
Tip 3. Enable email scanning by your anti-virus, disables automatic previewing. Never respond to the email requests which demands the personal and company account information.
Fact: 91% of the advanced cyber-attacks begin with email.
Tip 4. Do not share your password with anyone! Try not using the same security questions across multiple sites and change your password on the regular 90-days basis at least.
Fact: According to reports, More than 1 billion passwords are stored in Russian databases already.
Tip 5. Your password must be 12 characters long, include numbers, symbols and uppercase and lowercase letters combination. Stop using passwords such as mobile numbers, patterns as “password”, “QWERTY” or “123456”.
Fact: Avoid using the passwords that are quite common as 0000, 123456789 or date of birth etc.
Tip 6. Protect against Key logger. Malicious software or malware can make its way from the downloads, email, social media onto machines. One of such malware is the Key logger. Key logger tracks the keystrokes of the user. Every input from the keyboard is stored and lately, it allows the attackers to see passwords and other confidential information. Frequent update of the software will help to avoid such malicious software activities.
Tip 7. Recognize the social engineering. Social engineering can be used both offline and online by the criminals. It is also known as pre-texting. Many criminals with the help of social engineering make the users install malicious software such as fake antiviruses.
Tip 8. Secure the Wi-Fi: Encrypt the Wi-Fi for the security purpose. There were flaws in the older wireless forms of encryption. Your company should employ the WPA2 encryption i.e. Wi-Fi-Protected-Access 2.
Cybersecurity is everyone’s responsibility
With the increasing number of successful cyber attacks against high-profile targets, it’s important to stay alert and responsible. Cybersecurity is everyone’s responsibility. There’s no magic wand, obviously, but the more precautions the better.
(Originally shared for SALUTE INDIA’s Print Version Magazine. May-June, 2016)