Common Security Issues In Computers And How To Fix Them
- Get link
- X
- Other Apps
Criminals have found their way to cybercrime with the common flaws that users miss when it comes to internet security
Cybercrime has evolved in terms of nature and scope. Here are the 10 Deadly Sins of Cybersecurity:1. Weak passwords
Despite being the most
fundamental premise, strong passwords, it is often one of the most overlooked
practices. Many users still have weak passwords.
2. Predisposition to phishing
Phishing is a common method of
identity theft that uses fake emails to obtain confidential information from
users. If you are one of those who answers emails asking for “account
information”, then it is likely that you have been the victim of a phishing
fraud.
3. Lack of back-up information
A user can lose information in
unforeseen events such as a hardware or software failure, a virus attack,
accidental deletion of a file among many others that are so common. Carrying
out proper information backup procedures enables users to retrieve information
in times of crisis. The problem is that this is another of the practices that
users are not used to.
4. Unsafe Internet browsing
Web browser vulnerabilities can
compromise the security of a system and its information and make it easier for
a hacker to attack. Did you know that having the latest updates installed and
the newest version of internet software
are just the first step to preventing a threat? Do you practice them frequently
and dedicate enough importance to them?
5. Use of pirated software
Do you use pirated software or
operating systems? If your answer was yes, then you are more vulnerable than
someone who is not to undergo an attack. Pirated software can be used to sow
Trojans and viruses on computers and since the software is not supported since
it is pirated, the user is deprived of technical support, leaving the attack at
the expense of unaided.
6. Misuse of portable storage devices
Given the great practicality of
these devices, improvements in the procedures for transferring information in
the work environment and storage capacities, portable storage devices have been
used to download sensitive and privileged information from clients of
organizations, which may misuse her. The use of these devices should be
controlled, for select users and with default devices.
7. Lack of adequate encryption
If a user does not have essential
practices for the security of his network on site, he is practically invited
malicious entities to attack his system. A network can be secured by following
adequate security protocols, thus avoiding risks such as: unauthorized access
to files and information and the capture of users and passwords, to name a few.
8. Lack of regular updates
Threats are always at the
forefront, are you just as up to date? Users should keep track of the latest
versions of software to improve their performance and thus stay up-to-date on
security updates that are released on a regular basis with enhanced security
features to protect against the latest threats.
9. Using Wireless connections
Users commonly make connections
to free networks such as those provided by cafes, airports or universities.
Although they are quick, easy and free to access, they may not be secure and
accessing them can open the doors to threats more easily. Using a VPN (Virtual
Private Network) can be a safe way to connect with your network company.
10. Lack of awareness or proper training
Since the internet and wireless connections have come to revolutionize the daily routine of users, it is now very common to carry out relevant transactions through this means such as transfers and access to bank accounts or purchase of online services in a very simple way. However, the sensitivity of this information must be handled with caution and being aware that threats and attacks can be prevented with proper training and knowledge of the risk of the situation.
Cyber attackers will make use of
any vulnerability and take any opportunity for an attack. We are not the ones
who provide them with more and new attack vectors to do so. A first step: not
be a participant in these previously mentioned practices. Raising awareness
among users is essential to limit threats in cyberspace.
- Get link
- X
- Other Apps
Comments
Post a Comment