cyber security tips

3 Cyber Security Tips for Travelers

cyber security tips for travelersHelp keep your personal data safe while you’re on the road with these quick cyber security tips for travelers from Norton.

  1. Lock your devices: Most smart phones, laptops and tablets will allow you to lock the device using a PIN number or fingerprint ID. In the event that any of your devices have been momentarily misplaced or forgotten, this will be the first line of defense against a security breach.
  2. Use caution with public internet: Free Wi-Fi access is appealing when you travel but is also particularly vulnerable to security issues. Avoid unencrypted networks, and ask your hotel about its security protocol before connecting to the Web. If you must use public Wi-Fi, avoid accessing personal accounts or sensitive data while connected to that network.
  3. Disable Bluetooth: Just like your phone’s automatic Wi-Fi connectivity, Bluetooth connectivity can present problems. Bluetooth signals can come from anywhere. If your Bluetooth is left on, nearby assailants can connect to your phone and potentially hack into your device. Keep Bluetooth disabled as much as possible while traveling.

For more tips from Norton, especially for business travel, click here. You can also read more articles on cyber security from the Perspective team by clicking here.

By |2019-08-14T13:59:46-07:00January 21st, 2019|Current Affairs|

18 Cyber Security Tips for 2018

cyber security

18 Cyber Security Tips for 2018

Here are 18 helpful cyber security tips for 2018 to keep your electronic data and devices safe.

  1. You are an attractive target to hackers. Don’t think, “It won’t happen to me.”
  2. Lock your computer when you are away from it. Even a few minutes is enough time for someone else to destroy or corrupt your information.
  3. Avoid unintentionally installing spyware on your electronic devices; never click on links within pop-up windows.
  4. Be wary of free downloadable software; you may be exposing your computer to spyware programs by downloading programs from questionable websites.
  5. Install both anti-virus and anti-spyware software on your computer, and make sure they are compatible.
  6. Take a little time to review, understand and use the privacy settings on social networking sites.
  7. Turn off the option to automatically download attachments in emails.
  8. Be wary of unsolicited attachments in email, even from people you know.  Many viruses can “spoof” the return address, making it look like the message came from someone else.
  9. Use different passwords on different systems and accounts.
  10. Don’t use passwords with personal information that can be accessed or guessed; use capital and lowercase letters, numbers and characters.
  11. Report spam email messages.
  12. Never click on a link in an email from someone you do not know.
  13. Stay safe when shopping online. Only do business with reputable vendors. Some cyber attackers create malicious websites that appear to be legitimate; always verify the site before supplying any personal or financial information.
  14. Never plug an unknown USB drive into your computer to try to identify or locate the owner.
  15. Monitor your accounts (email, social media, banking, etc.) for any suspicious activity. If you see something unfamiliar, it could be a sign that you’ve been compromised.
  16. Disable Bluetooth when you’re not using it, to help prevent hacking.
  17. Hackers have strategies for attacking devices through public Wi-Fi. Keep firewalls enabled at all times; turn off file sharing when using  public Wi-Fi.
  18. Remember you can be a victim of cyber crime offline, too.  If someone calls asking for sensitive information, say no. Call the company directly to verify before giving out information.

Sources: Department of Homeland Security; Heimdal Security; Cisco

By |2019-08-14T13:59:51-07:00January 3rd, 2018|Current Affairs|

Privacy Requires Extra Effort

In this digital age, privacy requires extra effort for each of us.

Hackers use a number of ways to get into electronic devices (laptops, smart phones, tablets). The most common type of cyber crime is the phishing scam, which can arrive in the form of an email or text and contains a link. These messages are often realistic-looking, use fraudulent websites and appear to be sent from a friend or trusted sender (such as a bank or social network), so you’ll feel safe to click on the link. Yet, clicking on these links loads software onto your device, which gives hackers access to install any number of other programs that allow them to spy on you and steal your data.

Installing security software on all your electronic devices is a critical first step in beating cyber crime. In addition, it’s important to understand how phishing scams work and what they look like when they land in your inbox.

Some of the sites spoofed most regularly include PayPal, eBay, Yahoo! and MSN, as well as financial institutions. Any legitimate site can be spoofed; and hackers also create fake websites, emails and text for cartoon gaming, celebrities and other popular children’s sites as a way to get private information. So be sure to educate the children in your life about the risks, as well.

Norton, a leader in antivirus and security software, offers the following information and recommendations:

  • Be wary of emails or texts asking for confidential information – especially information of a financial nature. Legitimate organizations will never request sensitive information via email, and most banks will tell you that they won’t ask for your information unless you’re the one contacting them.
  • Don’t get pressured into providing sensitive information. Phishers like to use scare tactics, and may threaten to disable an account or delay services until you update certain information.
  • Never submit confidential information via forms embedded within email messages. Senders are often able to track all information entered.

The best advice is to always call the vendor or financial institution directly, using a phone number that you have verified, before disclosing any information. You are your best defense against cyber crime.

By |2019-08-14T13:59:52-07:00July 17th, 2017|Current Affairs|