Network Security Blogs

Internet and Computer Security Advisories and Updates

Yes You Are Targeted

Yes You Are targeted



Why You Are Targeted

 Crimes such as fraud, identity theft or extortion have existed for as long as there have been civilizations, they are a part of our daily lives. A criminal’s goal has always been the same: to make as much money as possible, as easily as possible, and with as little risk as possible.

Now cyber criminals can easily target almost everyone in the world, with little or no cost, and at very little risk. Additionally, cyber criminals have become highly organized and efficient, enabling them to be more effective than ever

 Ultimately, cyber criminals know that the more credit cards they steal, the more bank accounts they hack, or the more passwords they compromise, the more money they can make.

They will literally attempt to hack anyone connected to the Internet, including you. Hacking millions of people around the world may sound like a lot of work, but it is surprisingly easy as they use automated tools to do all the work for them.

For example, they may build a database of millions of email addresses and use an automated tool to send a phishing message to every one of those addresses. Sending the emails costs the criminals almost nothing: they simply use other hacked computers, perhaps even yours, to do their dirty work. This is also another example of why your devices.

Protecting Yourself in 6 mostly used and important platform.
 When cyber criminals attempt to hack people around the world, they are typically using relatively simple methods.  Fortunately, by following some equally simple steps you can go a long way towards protecting yourself. Some steps we recommend include the following steps :

1      1.   Yourself:
Ultimately, YOU ARE THE FIRST LINE of defense against any cyber attackers NOT JUST PHYSICAL ATTACK. Many attacks begin  with a cyber criminal trying to trick or fool you, such as tricking you into opening an infected email attachment or fooling you into giving up your password over the phone or email. Common sense is your best. Defense, if something seems odd, suspicious or too good to be true, it is most likely an attack

      2.     Updating:
Make sure that any computer or mobile device you use is fully updated and has all the latest  patches. This is not only important for your operating system ( OS ), but for any applications or plugins you are using ( either java, adobe ). By always keeping your systems and applications updated you help protect yourself against the most common attacks

 3.       Passwords:
As Usual , Make sure to Use a strong and unique password for each of your accounts. That way when a website you  use gets hacked and all the site’s passwords are compromised (including yours) your other accounts are safe. Also ensure that all your different devices are protected by a strong, unique password, PIN or some other type of locking mechanism. To securely keep track of all your different passwords we recommend you to use a Password Manager

4     4.   Credit Cards:
 Check your financial statements often, we recommend at least weekly (monthly is not  enough). As soon as you see any unauthorized transactions on your credit card, report it immediately to your card issuer. If your bank allows you to set email or text message alerts for unusually large or odd transactions, use them for even faster notification of suspicious activity

5    5.   Your Network:
Secure your home network Wi-Fi access point with a strong administrator password  and ensure your Wi-Fi network requires a password for anyone to join it. Also ensure that that you know what devices you have connected to your home network and all those devices are update.

6     6.  Social Media:

The more Information you post online the more likely you may put yourself at risk. Not  only can any information you post make it easier for cyber criminals to target and fool or trick you, but any information you post may actually identify you as a more valuable target.

0 Komentar untuk "Yes You Are Targeted"

 
Copyright © 2014 Network Security Blogs - All Rights Reserved
Template By shahdinar