We live in an era,where cyber security is a momentous issue.Cyber crimes are becoming the new normal nowadays.so what makes you think that you will be spared by cyber criminals?we have suggested some steps to remember for the rest of your life to safe guard your self from very common cyber attacks.so,let’s get back to the original question!
We live in an era, where cyber security is a momentous issue. Cyber crimes are becoming the new normal nowadays.so what makes you think that you will be spared by cyber criminals? we have suggested some steps to remember for the rest of your life to safe guard your self from very common cyber attacks. so, let’s get back to the original question!
how to protect your self from cyber attacks? or how to protect your self online?
how to protect your self from cyber attacks? or how to protect your self online?
Here’s what to do for protecting your self online.
1. Instead of ‘Passwords’, Use ‘Passphrases’ for Different websites
Use different user ID/password combinations for different accounts and avoid writing them down. you can create more complicated passwords by combining letters, numbers, special characters (minimum 8 characters in total) and change them on a regular basis.
Using pass-phrases is a wonderful idea, sentences such as ILoveFacebookSoMuch are very hard to crack!
1. Instead of ‘Passwords’, Use ‘Passphrases’ for Different websites
Use different user ID/password combinations for different accounts and avoid writing them down. you can create more complicated passwords by combining letters, numbers, special characters (minimum 8 characters in total) and change them on a regular basis.
Using pass-phrases is a wonderful idea, sentences such as ILoveFacebookSoMuch are very hard to crack!
You probably don’t want to remember too many passwords for too many websites.you can create your own format for passwords. for example: yourname(xx)@websitename, where xx is any 2 digits random number
2. Secure your computer/laptop physically and by:
Activating your firewall
A Firewall works exactly as the name suggests. it monitors all the incoming and outgoing traffic towards your computer. If your antivirus doesn’t include a firewall, make sure you have windows firewall ‘Activated’.
A Firewall works exactly as the name suggests. it monitors all the incoming and outgoing traffic towards your computer. If your antivirus doesn’t include a firewall, make sure you have windows firewall ‘Activated’.
Using Anti-Virus/Anti-Malware software
Prevent viruses from infecting your computer by installing and regularly updating Licensed anti-virus software. New research from Microsoft shows that nearly 10% of Windows 8 users are running expired AV software on their systems, making them four times more likely to get infected.To ensure maximum cyber security, most of the antivirus softwares protects from virues, malwares and rootkits, so you may not have to install multiple softwares.
Prevent viruses from infecting your computer by installing and regularly updating Licensed anti-virus software. New research from Microsoft shows that nearly 10% of Windows 8 users are running expired AV software on their systems, making them four times more likely to get infected.To ensure maximum cyber security, most of the antivirus softwares protects from virues, malwares and rootkits, so you may not have to install multiple softwares.
Prevent spyware from getting into your computer by NOT installing ‘cracked’ softwares
Do not install cracked softwares or apps, as they may install some other malicious softwares too!
Don’t just click NEXT..NEXT….NEXT..while installing a software.choose “custom installation” mode instead of “standard installation” mode.you will be able to save your self from installing other softwares, toolbars.check for them now and uninstall existing extras from “uninstall a program” in control panel.
Don’t just click NEXT..NEXT….NEXT..while installing a software.choose “custom installation” mode instead of “standard installation” mode.you will be able to save your self from installing other softwares, toolbars.check for them now and uninstall existing extras from “uninstall a program” in control panel.
3. Never upload your personal data ‘unencrypted’ to dropbox,google drive or any online file sharing services.
It takes not more than 5 minuts to encrypt a zip file or any single file such as a photo, video or a document with AES-256 bit encryption.but it saves you from getting your personal data leaked.and you can relax even if these big companies face a data breach!if using windows, use bitlocker to encrypt hard disk drives with important data!
It takes not more than 5 minuts to encrypt a zip file or any single file such as a photo, video or a document with AES-256 bit encryption.but it saves you from getting your personal data leaked.and you can relax even if these big companies face a data breach!if using windows, use bitlocker to encrypt hard disk drives with important data!
you may use this software to encrypt your files: https://www.aescrypt.com/download/
4. Crosscheck your Social-Media security settings
Make sure your social networking profiles (e.g. Facebook, Twitter, Youtube, google+ etc.) are set to private. Check your security settings. never post sensitive information about you online!. Once it is on the Internet, it is there forever!commenting on various website may show up after 2 years in google search result of your name!try a google search for your name with double quotes. for example: http://bfy.tw/mnR
Make sure your social networking profiles (e.g. Facebook, Twitter, Youtube, google+ etc.) are set to private. Check your security settings. never post sensitive information about you online!. Once it is on the Internet, it is there forever!commenting on various website may show up after 2 years in google search result of your name!try a google search for your name with double quotes. for example: http://bfy.tw/mnR
Showcase your products here, contact us at admin@cyberworldmirror.com
If you see a weird/abusive facebook post shared by your friend.DO NOT…i repeat DO NOT CLICK THAT.
as it may make you the victim.you should report it to facebook, tell your friend..but never ever …ever ..ever CLICK that.if something is encouraging you to SHARE before letting you access/read it.you know where’s the close button! USE IT!
as it may make you the victim.you should report it to facebook, tell your friend..but never ever …ever ..ever CLICK that.if something is encouraging you to SHARE before letting you access/read it.you know where’s the close button! USE IT!
5. Do not procrastinate update installations (even the “installing 127 of 1204” ones) !
Keep your applications and operating system (e.g. Windows, Mac, Linux) updated with the latest security updates.these updates are not just limited to adding new features to your system, but it comes with security patches for vulnerabilities in your operating system.
Keep your applications and operating system (e.g. Windows, Mac, Linux) updated with the latest security updates.these updates are not just limited to adding new features to your system, but it comes with security patches for vulnerabilities in your operating system.
keep common softwares /plugins such as flash player, Microsoft Office
‘up to date’.as they are widely used, hackers are always finding ways to exploit their vulnerabilities.
‘up to date’.as they are widely used, hackers are always finding ways to exploit their vulnerabilities.
6. WiFi-The most vulnerable network Ever!!
Always secure your wifi with secure password, WPA2 encryption, etc. Do NOT use public wi-fi for transactions.
if not properly configured, every wifi is vulnerable.
if not properly configured, every wifi is vulnerable.
Review and modify default settings and passwords. Never use public wifi, if you have some personal /secret information in your personal/office laptop, they are vulnerable. Avoid conducting financial or corporate transactions on these networks.
7. Encrypt your data (!Important)
Use encryption for your most sensitive files such as tax returns or financial records, make regular back-ups of all your important data, and store it in another location. Do not leave your credit card around that tempts children to use them.
Use encryption for your most sensitive files such as tax returns or financial records, make regular back-ups of all your important data, and store it in another location. Do not leave your credit card around that tempts children to use them.
[wpdevart_like_box profile_id=”792637984138412″ connections=”show” width=”300″ height=”150″ header=”small” cover_photo=”show” locale=”en_US”]
8. Secure your Mobile Devices Physically and Digitally.
Be aware that your mobile device is vulnerable to viruses and hackers.Take care of the security even though you download apps ONLY from ‘Google Playstore’.Worst case scenario is getting your phone camera hacked and the hackers may steal the photographs which THEY took from your mobile.
Be aware that your mobile device is vulnerable to viruses and hackers.Take care of the security even though you download apps ONLY from ‘Google Playstore’.Worst case scenario is getting your phone camera hacked and the hackers may steal the photographs which THEY took from your mobile.
9. Protect your e-identity, look for https://
Be cautious when giving out personal information such as your name, number, address or financial information on the Internet. Make sure that websites are secure and using https.their address will be look like this.
https://www.facebook.com.
https is essential for websites which involve financial transactions. it means the data you send and receive is encrypted.
make sure that you’ve enabled privacy settings (e.g. when accessing/using social networking sites).
https://www.facebook.com.
https is essential for websites which involve financial transactions. it means the data you send and receive is encrypted.
make sure that you’ve enabled privacy settings (e.g. when accessing/using social networking sites).
10. Do NOT store your card details on websites
If a website insists for storing your credit card information, so that your transactions can be processed faster next time, back off! you will never want to find your credit card information if that website’s database is dumped on pastebin or ghostbin like websites. try searching for last 6 or 8 digits of your credit cards numbers in google with double quotes to make sure that your credit card info is not available on the internet.(it may be available in deepweb).
If a website insists for storing your credit card information, so that your transactions can be processed faster next time, back off! you will never want to find your credit card information if that website’s database is dumped on pastebin or ghostbin like websites. try searching for last 6 or 8 digits of your credit cards numbers in google with double quotes to make sure that your credit card info is not available on the internet.(it may be available in deepweb).
11. Got hacked??Call the right person/ lawyer / LEA for help
Don’t panic! If you are a victim, if you come to know about any illegal Internet content (e.g. child exploitation) or if you suspect a computer crime, identity theft or a financial scam, report that to respected law enforcement agency. If you have any problems with your personal computer, ask for help only to a trusted person or a certified technician.
Don’t panic! If you are a victim, if you come to know about any illegal Internet content (e.g. child exploitation) or if you suspect a computer crime, identity theft or a financial scam, report that to respected law enforcement agency. If you have any problems with your personal computer, ask for help only to a trusted person or a certified technician.