Thank You for interesting on my weblog. For more information please contact - 76neverend@gmail.com

Monday, February 27, 2017

Keep your devices safe and secure when you’re online



Passwords

The importance of passwords
Making sure your computer or device is password-protected is one of the easiest things you can do. It’s one of the most effective ways of keeping your device secure from cyber criminals who might try to log in and access your files and data, or install malware (malicious software).
Without this simple step, your computer and all your personal information and files are left vulnerable to hackers, spammers, identity thieves – and even an offline thief if your computer is ever stolen.
Here are a few tips for protecting your passwords:
·         Always follow the guidelines for creating strong passwords.
·         Never write your password down or store it on or near your computer or laptop. Instead, commit it to memory so you and you alone are the keeper of the combination.
·         If you need to walk away from your computer while you’re at work, make sure you password lock it or set it to lock automatically.
·         As an extra layer of security on top of device password protection, you can also lock any documents or files you choose (such as financial documents or sensitive business files).  Check your OS help menu or the file’s application program (such as Microsoft Word or Excel) to learn how.
·         Never leave your laptop or tablet unattended in public spaces such as cafés and libraries – a moment is all a thief needs.

Software

Protect yourself with security software
The number of viruses, Trojans, worms and spyware that can attack your devices is growing exponentially.
These sophisticated new invaders are no longer just irritating pranks and jokes. Today’s malware and viruses are serious threats that can destroy your computer, steal your identity and infect your entire digital network of friends, family and associates.
Here’s the software you need to keep yourself and your device safe.

Anti-virus software
This security software scrutinizes everything that comes into your device from the Internet and vice versa. All documents you open, all files you download and all emails and attachments are immediately scanned and examined. If infected and suspicious items are caught, they are quarantined or destroyed so your device and data stays safe and secure.

Anti-spyware software
Spyware can get into your computer and keep track of your Internet activities, such as your browsing history and password keystrokes. To keep your Internet activities safe, anti-spyware software scans your entire device at periodic intervals. Unwelcome spy “bugs” and other surveillance software are quarantined and then destroyed.

Anti-spam software
To divert and isolate the countless scam emails and unsolicited messages we all receive every day, anti-spam software uses sophisticated filters to immediately separate spam from the “good” messages. It’s a great way to stop spyware and malware, which is often embedded in spam emails.
Tips on how to use security software properly:
·         Always keep software up to date. This is a key thing to remember – especially since a new virus or malware is designed to get past outdated security measures. With software security updates, viruses and malware have little chance against the newest threat detection and protection.
·         Don’t ignore update notices. Most security software gives you update notices, or better yet automatically updates or delivers the newest version straight to your device on its own.
·         Renew expired trial software. If you bought your device recently, it may have anti-virus and spyware software already installed on a trial basis. Just make sure you renew or find other security software when the trial expires.
·         Install separate virus and spyware protection. Some anti-virus and anti-spyware protection is combined in one program, others come separately. Think about using two different programs to really protect yourself.
·         Run the anti-virus/anti-spyware software and do a scan of your hard drive and files as soon as it’s installed. Especially if your device has been unprotected (which could mean it’s already infected). Schedule it to run regularly.
·         Never trust security updates from pop-up ads or emails. If a pop-up ad tells you your computer has been scanned for malware and you must upgrade now, it may actually be malware masked as an anti-spyware program. These try to trick you by preying on your fear – however, the only anti-spyware software on your computer should be the one you’ve installed.

Firewalls

Surf the safe way
The Internet connects hundreds of millions of devices to each other, which means any one of those devices can find and access your device. To make sure only the users you approve can access your data and information through the web, you need a firewall.
The same way your anti-virus protection scrutinizes files, emails and downloads between your machine and the web, a firewall acts as a guard between your device and any other device that is trying to access it through the web. It also makes sure all of the access points in your computer are secured at all times except for those few which you are currently using. When you're browsing the Internet, the easiest thing to do is make sure your firewall is "on".
How to enable firewall security:
·         Often, firewall protection will already be part of the OS (operating system) your computer came with. Check to see that it is turned "on", and ensure that it's updated on a constant basis. Your OS' help menu or online help should be able to guide you.
·         If your OS doesn't include a firewall, install your own firewall software, which will always be quietly guarding your device while you go about your surfing.
·         There is a good selection of free and paid firewall software available on the Internet. Look for programs from credible companies.
·         Rather than software, you may also use a hardware firewall, which is an external device with built-in firewall software. For example, wireless routers targeted at home consumers often have a firewall which can be configured via the administrator web access. This type of firewall helps to prevent unwanted traffic from reaching your computers on the network.
·         Just like your other security programs, to gain maximum protection, you need to keep your firewall constantly updated.

Browser Settings

Make sure no one is browsing but you
Did you know that the browser you use has its own security settings? And of course, predators and hackers are good at spotting weak browser settings, so it's important to use this feature as an added layer of protection.
Here's how to surf with browser security:
·         Browser options are set to balance security and functionality – if you set your security for maximum, you'll limit some of the browser's features resulting in a less enhanced webpage experience (for instance, you may not be able to run certain plugins or scripts required to make all elements of the webpage run properly). On the other hand, if you want maximum functionality, the trade off is lower security.
·         Almost all browsers will carefully outline the pros and cons of setting your security at different levels and enabling or disabling functions so you can strike the right balance for you.
·         It's likely your computer came with a pre-installed browser. However, the default security settings may not meet your needs. Always set your own browser options, whether they're the ones that came with your devices or the ones you install yourself.
·         If you're unsure about how high to set your security, opt for more security and experiment to see if you're getting the web experience you want.
·         Use the drop down menus on your browser to set your options. Keep in mind that your security settings will automatically set your functionality features.
·         Keep your browser updated with the newest version to ensure your computer has the latest security features. Check to see that the new version has your browsing options set to your liking.
·         Most browsers will inform you of safe browser updates and potential security threats, and provide advice on how to address problems. If you are alerted to a new version or update, be sure to install it.
·         If children or inexperienced users are surfing on your device, consider choosing the maximum security settings and less enhanced web functionality.
·         If you visit a site you know is safe, you can always enable the enhanced functionality on a temporary basis. Just make sure you disable it when you're done with the website.
·         Clear your cache and your browsing history when you're finished browsing for the day so that you don't leave a record on your computer of any login IDs, passwords, banking information or other sensitive data.

OS Updates

Let your operating system protect you
Your operating system (OS) manages all functionality on your computer. Just like your security software, firewall and browser, it can be a vulnerable weak spot targeted by hackers if it isn't kept up-to-date.
Here are some tips on how to maximize your OS security updates:
·         Try to keep your OS updated with the newest version.
·         Your OS has many security features built-in. The OS manufacturer will release regular updates called ‘patches' or ‘fixes' to constantly upgrade and improve security.
·         Make sure you enable automatic updates on your OS so your device will automatically download and install these fixes as soon as they're available.
·         If your OS asks you to take action or download a fix manually, do it – your OS can't protect you if you don't empower it properly?
·         Updating your OS when you're prompted is one of the simplest things you can do to protect your computer. After all, it's easier to allow an update than to have to reinstall your operating system.

Public PCs

A public computer is everyone's computer
A public computer can be really handy, especially when you're traveling without a laptop or tablet. However, with so many people sharing a public computer, there's a chance the device is already infected with viruses or malware, which are ready to harvest your personal data.
If you plan to only visit sites you don't need to log into, you're good to go. But otherwise, sites that require personal information, such as email or online banking, can be accessible by everyone – including hackers.
Follow these public computer safety tips to help you surf safely and confidently in hotels, airports, schools, Internet cafés, libraries… or wherever your day takes you.
Never save your name or passwords on a public computer. If there's a "save" option for your email or a website login, make sure it's disabled.
Make sure you log out when you're done with a site.
Never do financial transactions, or view or exchange sensitive data such as passwords, credit card numbers and bank details through a public device - even if those websites have excellent security, encryption and digital certification.
If possible, don't use USB drives or memory sticks. Viruses and malware are made to be easily infectious. If you need to use USB storage, make sure to insert your USB the next time you use it with your personal device, then scan your drive or stick with your anti-virus/anti-spyware software before you use it again.
Before you log out of the computer, drop down the tools menu and delete your browsing history and cookies, and disable the auto-complete feature – this will erase any record of sites you visited and all information exchanged including passwords and log ins.
If you're done or need to step away from the computer even for a minute, make sure you log out of the device.
As a common sense precaution, always make sure that no one is looking over your shoulder to gain your personal data. That's true of using any device in public areas, not only public computers.
There's no need to avoid public computers completely. Just be sure you're treating it as it is – public access that is anything but private.

Wi-Fi Networks

Keep your wireless network to yourself
Wireless networks connect the Internet to web-enabled devices by radio signals instead of using cables or wires. They provide flexibility and convenience, but also bring increased risk.
Smartphones and mobile devices that are automatically wireless have their own set of risks and precautions, which you can learn about here.
Securing your home Wi-Fi network
Wi-Fi security in public places

Public Wi-Fi networks are not secure and can be accessed by many different people. You can't rely on the same security as you would on your home Wi-Fi. So you need to take a couple of extra precautions, such as:
Stick to wireless networks and hotspots that you know – like your local coffee shop or the airport where they provide you with a password to use their Wi-Fi. Unknown or unsecured public Wi-Fi doesn't require a password, so anyone can connect to it.
Check that you're connected to the correct network.
Hackers have been known to set up a phony parallel network near legitimate public Wi-Fi specifically to capture personal data and hijack information. Just one more reason to confirm you're on the right network.
So you're on a trusted, legitimate network. Now you also need to protect yourself from others connected to the same public network. Here are some tips for public Wi-Fi security:
·         If you're using your computer in a public Wi-Fi zone but you're not on the Internet, it doesn't hurt to turn your device Wi-Fi off (click the wireless icon in your main menu bar or manually adjust this on the device hardware).
·         Never surf without your firewall enabled – especially on a public Wi-Fi network. Here's how to install and enable a strong firewall.
·         Never trust the wireless encryption on a public Wi-Fi. Instead, make sure your websites scramble your data by enabling the SSL encryption in the settings of the sites you visit (like your email).
·         Visit the secure HTTPS version of sites and not the unsecure, regular HTTP site. Adjust the site URL with an extra ‘S' in your browser's address bar if needed. Be mindful of the URL in the address bar while you're exchanging sensitive data – if the ‘S' disappears you should log out right away.
·         Surfing a social network on a public Wi-Fi network can be riskier than visiting normal websites. For instance, once you log in, criminals on the same network can also log in as you. Take extra precautions by erasing your browsing history, your cookies, etc. as if you were on a public computer.
·         If you find yourself using public Wi-Fi a lot, a VPN (virtual private network) makes a lot of sense. It'll direct all your web activity through a secure, independent network that encrypts and protects all your data. A VPN is offered by most Internet Service Providers as a secondary service.

File Downloading and Sharing

Protect yourself while downloading and file sharing
Being able to share and download files, such as documents, programs, pictures, music and movies is one of the most appreciated aspects of the Internet. And while there are many large retail sites that offer paid downloads, many users are also sharing files between one another.
There are many different ways to share files between users, such as email and using peer-to-peer (P2P) sharing.
When it comes to downloading files in the more traditional sense or using a service like P2P sharing, there are risks to be aware of, including copyright infringement, expensive lawsuits, and potential criminal consequences.
Whenever you download files off the Internet, you must use caution and ensure that you are getting them from a trusted source.
Always use your antivirus software to scan files you download.
If you are using an additional piece of software to download files (such as P2P), make sure you get software you trust and be extra careful not to install the adware that often comes packaged with it.
Be aware of what you are downloading and sharing as there are potential criminal consequences to copyright infringement.
You must keep all your security measures and OS (operating system) regularly updated and enabled when file sharing. Run your anti-virus and anti-spyware often and use them to scrutinize all downloaded files before you open them. Delete dangerous files and malware immediately.
File sharing may require you to open your firewall to allow access. To lessen your chances of being hacked, always keep your firewall enabled and as up to date as possible.

Voice Over Internet Protocol (VoIP) Communication

Making secure phone calls over the web.
Voice over Internet Protocol (VoIP), such as Skype, allows you to talk to people over the Internet for free. You can even place calls between a VoIP number and a landline for a fee. However, because VoIP is web-based, it does come with increased security risk and threats. Be sure you know how to spot them.

Spotting VoIP security risks

Telephone fraud is nothing new, although VoIP requires a bit of extra vigilance. Here are some common VoIP security issues and threats to be aware of:
Vishing (Voice phishing) uses an automated voice from a seemingly trustworthy source (like your bank) to trick you into sharing data such as bank account details and PINs. Unfortunately, VoIP technology makes it easy to redirect calls to predators – even if you're the one who originally initiated the call.
Caller ID impersonation happens when a predator poses as someone you may know or a company you trust (your bank, for instance). They do this by stealing (or spoofing) a digital caller ID and calling you directly and then asking you to verify personal details or financial information.
Spam over Internet Telephony (SPIT) is a combination of telemarketing and spam. VoIP is a quick, cheap and easy way to generate and distribute huge volumes of voice spam. These SPIT messages are far more intrusive than spam, and can be megabytes in size eating up your capacity.
Sniffing, eavesdropping and phone tapping are shockingly easy with VoIP technology. In addition to intercepting and recording your voice calls, hackers can access all your call control features like voice mailbox, call forwarding and caller ID, using them to launch more complex fraud attacks. The more common application of VoIP eavesdropping and tapping is corporate espionage and the intercepting of sensitive corporate information and conversations.
Toll fraud involves hacking into a VoIP network and allowing unauthorized users to continuously call revenue-generating phone numbers – often international toll numbers – to generate significant revenue at your or your business' expense.

VoIP risks and safety

Despite the above risks, using VoIP safely can greatly enhance your abilities to communicate with others all around the globe – as long as you take some precautions. If you've been using the Internet safely and securely, you should apply those online protection measures to VoIP as well.
In addition, here are a few VoIP specific security guidelines and tips:
Go with a VoIP provider that has secure encryption capability on their system. Enable all available password and encryption measures to maximize your call privacy and minimize opportunities for hacking in.
Only use VoIP equipment which conforms to the most up-to-date wireless security standards.
Use a firewall that is customized for VoIP – one that will constantly scan for threats and attacks, and also alert you to suspicious calling activity.
Ideally, your VoIP line would have its own separate, dedicated Internet connection so data network threats and VoIP line threats remain isolated.
All of your devices should always have reputable, effective updated security software – especially when using VoIP.

Use a VoIP provider and voicemail system that features PIN protection. Make a point to change your password or PIN often.

Many thanks to Get Cyber Safe (Canada) for the important tips update for everyone. 
For many more please go to official website https://www.getcybersafe.gc.ca/index-en.aspx

No comments:

Post a Comment