Skip to main content

Top 7 Ways to Avoid Cyber Attacks


Viruses and identity theft are not new issues, but recently, individuals and companies are at a much greater risk as a result of the unanticipated increase in internet and technology use. Follow these tips to protect yourself from such an attack so that you won’t be the next victim. 
 
For ex., you receive an email promising a great joke if you open the attachment. You're not sure who sent it but you feel like a laugh and open it anyway. Big mistake. 
Attackers can break into your computer by sending you an email attachment with malware (malicious software) or downloading malware on to your computer when you open a link on a webpage. 
They want to use personal and financial details on your computer to steal money, buy things on your credit card or open up bank accounts in your name. 


Anyone who uses the internet needs to be aware of basic computer security: 


    1. Don't click the link  

If you don't know who sent the email, or if it's not a trusted website, then don't click the link. 

Beware: there is always an increase in email phishing scams around Christmas, whereby scammers have a fake retail store website and capture your credit card details when you buy online. 

2. Install Antivirus software 

Always have up-to-date antivirus protection and get regular updates, Don't press 'do it later' and update six weeks later. 

3. Use strong passwords 

Most of the population is still using '1234567' or their first name and last name, 

The problem is that there are about 20 different things that require passwords. The strategy now is to write them down it is a complete U-turn and put them in your wallet [which is usually in a safe place]. If you lose your wallet, you stop your credit cards and can also reset all your online passwords. 

* Never click 'remember my password'. 

* Use capitalslower casenumbers and symbols in passwords. Don't use words in the dictionary. 

* Change passwords regularly. 

* Password software is good at generating strong passwords but the human brain is the best tool of all. 

4. Keep software up to date 

This will ensure your software has the latest security upgrades. Attackers are always thinking up new ways to penetrate security. Don't ignore update notifications. 

5. Reconfigure wireless routers 

Buy a router with secure wireless encryption, otherwise your information is unprotected and can be stolen: for example, when banking or shopping online. 

When you get a new modem from a network provider, it may not be secured to encrypt traffic. People should go to the administration panel and configure their wireless network to WPA (Wi-Fi Protected Access) or WPA2 encryption. 

Reconfiguring routers is easy and something people don't do properly. 

Change the name of the router to something obscure, otherwise it gives attackers information on how best to attack that router. Also, change the default login to a unique password. 

6. Encrypt email 

Learn to use email encryption for sensitive documents. 

Don't send emails such as a child's health resume using Gmail or Hotmail. "There was [the recent case] where a Gmail employee started going through people's email accounts." 

7. Use a secure web browser 

Firefox or Opera, or My Favorite Google Chrome are secure web browsers 

"Internet Explorer is highly targeted by attackers because it is on so many machines. IE generally takes longer to patch or fix vulnerabilities." 

Eliminating internet and computer use from your life is impossible, so be sure to practice safe computing habits to protect yourself from cyber attacks. 

Do you have questions, comments, or suggestions? Feel free to post a comment! 

Comments

Popular posts from this blog

CIA Triad for- Base of Information security

The essential security principles of confidentiality, integrity, and availability are often  referred to as the  CIA Triad. All security controls must address these principles. These three  security principles serve as common threads throughout the CISSP CBK. Each domain  addresses these principles in unique ways, so it is important to understand them both in  general terms and within each specific domain: Confidentiality is the principle that objects are not disclosed to unauthorized subjects. Integrity is the principle that objects retain their veracity and are intentionally modified by  authorized subjects only. Availability is the principle that authorized subjects are granted timely access to objects  with sufficient bandwidth to perform the desired interaction. Different security mechanisms address these three principles in different ways and offer varying  degrees of support or application of these principles. Objects must be properly classified

List of Company Slogans

·          3M : "Innovation" ·          Agere Systems : "How Communication Happens" ·          Agilent : "Dreams Made Real" ·          Airbus : "Setting the Standards" ·          Amazon.com : "…and You're Done" ·          AMX : "It's Your World. Take Control" ·          Anritsu : "Discover What's Possible ·          AT&T : "Your World. Delivered" ·          ATG Design Services : "Circuit Design for the RF Impaired" ·          ATI Technologies : "Get In the Game" ·          BAE Systems : "Innovating for a Safer World" ·          Ball Corporation : "The Leader in Small Space and Rocket Systems" ·          BellSouth : "Listening, Answering" ·          Blackhawk : "Powering DSP Development" ·          Boeing : "Forever New Frontiers" ·          Bose Corporation : "Better Sound Through Research" ·          Bowers & Wil

My Article :- હેકર બનવું છે? કઈ રીતે?

મારી ૨ વર્ષ ની કારકિર્દી માં મને કેટલાય  લોકોએ, ખાસ કરીને કોલેજ ના વિદ્યાર્થીઓએ ઘણી વાર પૂછ્યું છે કે "મારે હેકર બનવું છે. તો હું શું કરું? " અને મારા બ્લોગ્સ માં પણ પૂછવામાં આવે છે કે એક સારો હેકર કઈ રીતે બની શકાય? એવું હું શું કરું અથવા તો મારા માં કઈ લાયકત હોવી જોઈએ એક હેકર બનવા માટે? આ પ્રશ્ન નો સંતોષકારક જવાબ આપવા માટે મેં internet પર શોધખોળ કર્યા પછી મને જે કઈ માહિતી મળી તેને હું આજે અહી રજુ કરું છું. મિત્રો, સૌપ્રથમ હેકર કઈ રીતે બનવું એ જાણવા પહેલા એ જાણવું જરૂરી છે કે ખરેખર હેકિંગ શું છે ? અને હેકર કોને કહેવાય. હેકિંગ ની સીધી અને સરળ વ્યાખ્યા નીચે મુજબ છે.  "તમારા કમ્પ્યુટર,નેટવર્ક(ઈન્ટરનેટ કે LAN દ્વારા) કે કોઈ ડીવાઈસ માં (ફોન, ટેબ્લેટ) માં કરવામાં આવતા ગેરકાયદેસર પ્રવેશ અને ઉપયોગ એ હેકિંગ કહેવાય છે."અને હેકિંગ કરતા લોકોને હેકર કહેવાય છે. હવે તમને થશે કે આવું શું કામ કરવું જોઈએ? આ તો ક્રાઈમ છે. તો તમને જણાવી દઉં કે હેકર મુખ્યત્વે ૨ પ્રકારના હોય છે.    વાઈટ હેટ હેકર્સ (એથીકલ હેકર્સ) : ધારો કે તમે તમારો ફેસબુક નો પાસવર્ડ ભૂલી ગયા(ખરેખર ના ભૂલતા ક્યારેય..)કે ત