Passwords
The importance of passwords
Making sure your computer or device is password-protected is
one of the easiest things you can do. It’s one of the most effective ways of
keeping your device secure from cyber criminals who might try to log in and
access your files and data, or install malware (malicious software).
Without this simple step, your computer and all your
personal information and files are left vulnerable to hackers, spammers,
identity thieves – and even an offline thief if your computer is ever stolen.
Here are a few tips for protecting your passwords:
·
Always follow the guidelines for creating
strong passwords.
·
Never write your password down or store it on or
near your computer or laptop. Instead, commit it to memory so you and you alone
are the keeper of the combination.
·
If you need to walk away from your computer
while you’re at work, make sure you password lock it or set it to lock
automatically.
·
As an extra layer of security on top of device
password protection, you can also lock any documents or files you choose (such
as financial documents or sensitive business files). Check your OS help
menu or the file’s application program (such as Microsoft Word or Excel) to
learn how.
·
Never leave your laptop or tablet unattended in
public spaces such as cafés and libraries – a moment is all a thief needs.
Software
Protect yourself with security software
The number of viruses, Trojans, worms and spyware that can
attack your devices is growing exponentially.
These sophisticated new invaders are no longer just
irritating pranks and jokes. Today’s malware and viruses are serious threats
that can destroy your computer, steal your identity and infect your entire
digital network of friends, family and associates.
Here’s the software you need to keep yourself and your
device safe.
Anti-virus software
This security software scrutinizes everything that comes
into your device from the Internet and vice versa. All documents you open, all
files you download and all emails and attachments are immediately scanned and
examined. If infected and suspicious items are caught, they are quarantined or
destroyed so your device and data stays safe and secure.
Anti-spyware software
Spyware can get into your computer and keep track of your
Internet activities, such as your browsing history and password keystrokes. To
keep your Internet activities safe, anti-spyware software scans your entire
device at periodic intervals. Unwelcome spy “bugs” and other surveillance
software are quarantined and then destroyed.
Anti-spam software
To divert and isolate the countless scam emails and
unsolicited messages we all receive every day, anti-spam software uses
sophisticated filters to immediately separate spam from the “good” messages.
It’s a great way to stop spyware and malware, which is often embedded in spam
emails.
Tips on how to use security software properly:
·
Always keep software up to date. This is a key
thing to remember – especially since a new virus or malware is designed to get
past outdated security measures. With software security updates, viruses and
malware have little chance against the newest threat detection and protection.
·
Don’t ignore update notices. Most security
software gives you update notices, or better yet automatically updates or
delivers the newest version straight to your device on its own.
·
Renew expired trial software. If you bought your
device recently, it may have anti-virus and spyware software already installed
on a trial basis. Just make sure you renew or find other security software when
the trial expires.
·
Install separate virus and spyware protection.
Some anti-virus and anti-spyware protection is combined in one program, others
come separately. Think about using two different programs to really protect
yourself.
·
Run the anti-virus/anti-spyware software and do
a scan of your hard drive and files as soon as it’s installed. Especially if
your device has been unprotected (which could mean it’s already infected).
Schedule it to run regularly.
·
Never trust security updates from pop-up ads or
emails. If a pop-up ad tells you your computer has been scanned for malware and
you must upgrade now, it may actually be malware masked as an anti-spyware
program. These try to trick you by preying on your fear – however, the only
anti-spyware software on your computer should be the one you’ve installed.
Firewalls
Surf the safe way
The Internet connects hundreds of millions of devices to
each other, which means any one of those devices can find and access your
device. To make sure only the users you approve can access your data and
information through the web, you need a firewall.
The same way your anti-virus protection scrutinizes files,
emails and downloads between your machine and the web, a firewall acts as a
guard between your device and any other device that is trying to access it
through the web. It also makes sure all of the access points in your computer
are secured at all times except for those few which you are currently using.
When you're browsing the Internet, the easiest thing to do is make sure your
firewall is "on".
How to enable firewall security:
·
Often, firewall protection will already be part
of the OS (operating system) your computer came with. Check to see that it is
turned "on", and ensure that it's updated on a constant basis. Your
OS' help menu or online help should be able to guide you.
·
If your OS doesn't include a firewall, install
your own firewall software, which will always be quietly guarding your device
while you go about your surfing.
·
There is a good selection of free and paid firewall
software available on the Internet. Look for programs from credible companies.
·
Rather than software, you may also use a
hardware firewall, which is an external device with built-in firewall software.
For example, wireless routers targeted at home consumers often have a firewall
which can be configured via the administrator web access. This type of firewall
helps to prevent unwanted traffic from reaching your computers on the network.
·
Just like your other security programs, to gain
maximum protection, you need to keep your firewall constantly updated.
Browser Settings
Make sure no one is browsing but you
Did you know that the browser you use has its own security
settings? And of course, predators and hackers are good at spotting weak
browser settings, so it's important to use this feature as an added layer of
protection.
Here's how to surf with browser security:
·
Browser options are set to balance security and
functionality – if you set your security for maximum, you'll limit some of the
browser's features resulting in a less enhanced webpage experience (for
instance, you may not be able to run certain plugins or scripts required to
make all elements of the webpage run properly). On the other hand, if you want
maximum functionality, the trade off is lower security.
·
Almost all browsers will carefully outline the
pros and cons of setting your security at different levels and enabling or
disabling functions so you can strike the right balance for you.
·
It's likely your computer came with a
pre-installed browser. However, the default security settings may not meet your
needs. Always set your own browser options, whether they're the ones that came
with your devices or the ones you install yourself.
·
If you're unsure about how high to set your
security, opt for more security and experiment to see if you're getting the web
experience you want.
·
Use the drop down menus on your browser to set
your options. Keep in mind that your security settings will automatically set
your functionality features.
·
Keep your browser updated with the newest
version to ensure your computer has the latest security features. Check to see
that the new version has your browsing options set to your liking.
·
Most browsers will inform you of safe browser
updates and potential security threats, and provide advice on how to address
problems. If you are alerted to a new version or update, be sure to install it.
·
If children or inexperienced users are surfing
on your device, consider choosing the maximum security settings and less
enhanced web functionality.
·
If you visit a site you know is safe, you can
always enable the enhanced functionality on a temporary basis. Just make sure
you disable it when you're done with the website.
·
Clear your cache and your browsing history when
you're finished browsing for the day so that you don't leave a record on your
computer of any login IDs, passwords, banking information or other sensitive
data.
OS Updates
Let your operating system protect you
Your operating system (OS) manages all functionality on your
computer. Just like your security software, firewall and browser, it can be a
vulnerable weak spot targeted by hackers if it isn't kept up-to-date.
Here are some tips on how to maximize your OS security
updates:
·
Try to keep your OS updated with the newest
version.
·
Your OS has many security features built-in. The
OS manufacturer will release regular updates called ‘patches' or ‘fixes' to
constantly upgrade and improve security.
·
Make sure you enable automatic updates on your
OS so your device will automatically download and install these fixes as soon
as they're available.
·
If your OS asks you to take action or download a
fix manually, do it – your OS can't protect you if you don't empower it properly?
·
Updating your OS when you're prompted is one of
the simplest things you can do to protect your computer. After all, it's easier
to allow an update than to have to reinstall your operating system.
Public PCs
A public computer is everyone's computer
A public computer can be really handy, especially when
you're traveling without a laptop or tablet. However, with so many people
sharing a public computer, there's a chance the device is already infected with
viruses or malware, which are ready to harvest your personal data.
If you plan to only visit sites you don't need to log into,
you're good to go. But otherwise, sites that require personal information, such
as email or online banking, can be accessible by everyone – including hackers.
Follow these public computer safety tips to help you surf
safely and confidently in hotels, airports, schools, Internet cafés, libraries…
or wherever your day takes you.
Never save your name or passwords on a public computer. If
there's a "save" option for your email or a website login, make sure
it's disabled.
Make sure you log out when you're done with a site.
Never do financial transactions, or view or exchange
sensitive data such as passwords, credit card numbers and bank details through
a public device - even if those websites have excellent security, encryption
and digital certification.
If possible, don't use USB drives or memory sticks. Viruses
and malware are made to be easily infectious. If you need to use USB storage,
make sure to insert your USB the next time you use it with your personal
device, then scan your drive or stick with your anti-virus/anti-spyware
software before you use it again.
Before you log out of the computer, drop down the tools menu
and delete your browsing history and cookies, and disable the auto-complete
feature – this will erase any record of sites you visited and all information
exchanged including passwords and log ins.
If you're done or need to step away from the computer even
for a minute, make sure you log out of the device.
As a common sense precaution, always make sure that no one
is looking over your shoulder to gain your personal data. That's true of using
any device in public areas, not only public computers.
There's no need to avoid public computers completely. Just
be sure you're treating it as it is – public access that is anything but
private.
Wi-Fi Networks
Keep your wireless network to yourself
Wireless networks connect the Internet to web-enabled
devices by radio signals instead of using cables or wires. They provide
flexibility and convenience, but also bring increased risk.
Smartphones and mobile devices that are automatically
wireless have their own set of risks and precautions, which you can learn
about here.
Securing your home Wi-Fi network
Wi-Fi security in public places
Public Wi-Fi networks are not secure and can be accessed by
many different people. You can't rely on the same security as you would on your
home Wi-Fi. So you need to take a couple of extra precautions, such as:
Stick to wireless networks and hotspots that you know – like
your local coffee shop or the airport where they provide you with a password to
use their Wi-Fi. Unknown or unsecured public Wi-Fi doesn't require a password,
so anyone can connect to it.
Check that you're connected to the correct network.
Hackers have been known to set up a phony parallel network
near legitimate public Wi-Fi specifically to capture personal data and hijack
information. Just one more reason to confirm you're on the right network.
So you're on a trusted, legitimate network. Now you also
need to protect yourself from others connected to the same public network. Here
are some tips for public Wi-Fi security:
·
If you're using your computer in a public Wi-Fi
zone but you're not on the Internet, it doesn't hurt to turn your device Wi-Fi
off (click the wireless icon in your main menu bar or manually adjust this on
the device hardware).
·
Never surf without your firewall enabled –
especially on a public Wi-Fi network. Here's how to install and enable a
strong firewall.
·
Never trust the wireless encryption on a public
Wi-Fi. Instead, make sure your websites scramble your data by enabling the SSL
encryption in the settings of the sites you visit (like your email).
·
Visit the secure HTTPS version of sites and not
the unsecure, regular HTTP site. Adjust the site URL with an extra ‘S' in your
browser's address bar if needed. Be mindful of the URL in the address bar while
you're exchanging sensitive data – if the ‘S' disappears you should log out
right away.
·
Surfing a social network on a public Wi-Fi
network can be riskier than visiting normal websites. For instance, once you
log in, criminals on the same network can also log in as you. Take extra
precautions by erasing your browsing history, your cookies, etc. as if you
were on a public computer.
·
If you find yourself using public Wi-Fi a lot, a
VPN (virtual private network) makes a lot of sense. It'll direct all your web
activity through a secure, independent network that encrypts and protects all
your data. A VPN is offered by most Internet Service Providers as a secondary
service.
File Downloading and
Sharing
Protect yourself while downloading and file sharing
Being able to share and download files, such as documents,
programs, pictures, music and movies is one of the most appreciated aspects of
the Internet. And while there are many large retail sites that offer paid
downloads, many users are also sharing files between one another.
There are many different ways to share files between users,
such as email and using peer-to-peer (P2P) sharing.
When it comes to downloading files in the more traditional
sense or using a service like P2P sharing, there are risks to be aware of,
including copyright infringement, expensive lawsuits, and potential criminal
consequences.
Whenever you download files off the Internet, you must use
caution and ensure that you are getting them from a trusted source.
Always use your antivirus software to scan files you
download.
If you are using an additional piece of software to download
files (such as P2P), make sure you get software you trust and be extra careful
not to install the adware that often comes packaged with it.
Be aware of what you are downloading and sharing as there
are potential criminal consequences to copyright infringement.
You must keep all your security measures and OS (operating
system) regularly updated and enabled when file sharing. Run your anti-virus
and anti-spyware often and use them to scrutinize all downloaded files before
you open them. Delete dangerous files and malware immediately.
File sharing may require you to open your firewall to allow
access. To lessen your chances of being hacked, always keep your firewall
enabled and as up to date as possible.
Voice Over Internet
Protocol (VoIP) Communication
Making secure phone calls over the web.
Voice over Internet Protocol (VoIP), such as Skype, allows
you to talk to people over the Internet for free. You can even place calls
between a VoIP number and a landline for a fee. However,
because VoIP is web-based, it does come with increased security risk
and threats. Be sure you know how to spot them.
Spotting VoIP security
risks
Telephone fraud is nothing new,
although VoIP requires a bit of extra vigilance. Here are some common VoIP
security issues and threats to be aware of:
Vishing (Voice phishing) uses an automated voice from a
seemingly trustworthy source (like your bank) to trick you into sharing data
such as bank account details and PINs. Unfortunately, VoIP technology
makes it easy to redirect calls to predators – even if you're the one who
originally initiated the call.
Caller ID impersonation happens when a predator poses as
someone you may know or a company you trust (your bank, for instance). They do
this by stealing (or spoofing) a digital caller ID and calling you directly and
then asking you to verify personal details or financial information.
Spam over Internet Telephony (SPIT) is a combination of
telemarketing and spam. VoIP is a quick, cheap and easy way to generate
and distribute huge volumes of voice spam. These SPIT messages are far more
intrusive than spam, and can be megabytes in size eating up your capacity.
Sniffing, eavesdropping and phone tapping are shockingly
easy with VoIP technology. In addition to intercepting and recording
your voice calls, hackers can access all your call control features like voice
mailbox, call forwarding and caller ID, using them to launch more complex fraud
attacks. The more common application of VoIP eavesdropping and tapping
is corporate espionage and the intercepting of sensitive corporate information
and conversations.
Toll fraud involves hacking into a VoIP network
and allowing unauthorized users to continuously call revenue-generating phone
numbers – often international toll numbers – to generate significant revenue at
your or your business' expense.
VoIP risks and
safety
Despite the above risks, using VoIP safely can
greatly enhance your abilities to communicate with others all around the globe
– as long as you take some precautions. If you've been using the Internet
safely and securely, you should apply those online protection measures
to VoIP as well.
In addition, here are a few VoIP specific security
guidelines and tips:
Go with a VoIP provider that has secure encryption
capability on their system. Enable all available password and encryption
measures to maximize your call privacy and minimize opportunities for hacking
in.
Only use VoIP equipment which conforms to the most
up-to-date wireless security standards.
Use a firewall that is customized for VoIP – one
that will constantly scan for threats and attacks, and also alert you to
suspicious calling activity.
Ideally, your VoIP line would have its own
separate, dedicated Internet connection so data network threats and VoIP line
threats remain isolated.
All of your devices should always have reputable, effective
updated security software – especially when using VoIP.
Use a VoIP provider and voicemail system that
features PIN protection. Make a point to change your password or PIN often.
Many thanks to Get Cyber Safe (Canada) for the important tips update for everyone.
For many more please go to official website https://www.getcybersafe.gc.ca/index-en.aspx
No comments:
Post a Comment