IS USING INTERNET SAFE?

Image
Many people surf the Internet as part of their work activities, others visit a wide range of pages to stay fully informed of the news in the world, perhaps simply to complement their educational training or to entertain themselves during leisure hours. But everyone wonders if it is really possible to surf safely on the internet and that is precisely what this article is about. What Is Internet Security? Within the operating rules and policies that are part of the management of the websites to which users have access, a series of parameters have been established in order to prevent and control unauthorized entry to the resources available within Internet. This is part of internet security and its goal is to maintain a level that allows users to enter each page without risks to their computer or the integrity of their personal information. Therefore, talking about security is having ways to prevent, protect and avoid unauthorized intrusion to private networks, such as corporate or ev...

CAN CYBERCRIME BE PREVENTED? TIPS TO CONSIDER

According to the latest, 926 cybercrimes were reported. In the ranking of the most frequent crimes, online extortion is in first place (25.50%) and then the increase in digital fraud (14%) and ' phishing ' (9.50%) stands out, known as a social engineering technique that involves sending fraudulent emails to access personal information.

cybercrime prevention
The cybercriminals use different methods and tools such as ' phishing ', the ' vishing ', the ' ransomware ', the ' malware ', among others, in order to steal personal information or private for fraudulent or deceptive actions.

What Is Understood By Computer Crime?

A computer crime, also called cybercrime, is all those unlawful and illegal actions that are carried out through computerized channels, such as web portals, social networks or mobile applications. Computer crimes are also considered those in which new technologies intervene, not only as a means but as a protected legal object or asset. In this sense, hacking a person's computer is considered a crime, as is hacking the programming software of a war missile. There are three types:

·       Frauds committed by manipulating computer equipment.

·       Computer forgeries, as an object or instrument.

·       Damages or modifications of programs or databases, sabotage, viruses or worms.

Types of Cybercrime

The fraud

How many of you have chains forwarded by WhatsApp warning of a new scam? It is one of the most common cybercrimes, most of which are fraud in nature.

This crime is committed through phishing or identity theft. Criminals use spam, fake websites, and all kinds of software to trick netizens into obtaining your personal passwords and keys to access your confidential information. There is a part of the population that is most vulnerable to this type of crime, and they are those with less knowledge about the Internet and about electronic commerce. Criminals sometimes talk to the victim until they establish a relationship of “trust” and influence their emotions to obtain money or other assets.

Impersonation and disclosure of secrets

Once the personal data of the victim has been obtained, their identity is impersonated to make purchases or other types of illegal activities, which can lead to the ruin of the affected person.

On the other hand, the disclosure of the victim's personal information is also considered a computer crime, since it threatens their privacy. The criminal may have access to their social networks, conversations and the right to their own image, among others. Within this group we distinguish:

·       Violation of the secrecy of communications.

·       Use and modification of personal data.

·       Illegal access to data and computer systems.

·       Dissemination of data, photographs or videos, among others.

Sometimes the offender threatens and coerces the victim to get something in exchange for not spreading intimate material about the victim.

Child pornography, sexting and stalking

The storage and dissemination of child pornography is one of the most prosecuted computer crimes given the seriousness of the matter. The Internet is the perfect way to distribute material of this type, since there are many portals protected with specific software that prevent the entry of “common” users.

On the other hand, sexting consists of sending images or text messages with sexual content. When the privacy and intimacy of the victim is violated and said content is disseminated, it constitutes a computer crime. In the same way, when it is about minors or when one of the parties does not consent to the activity, it also constitutes a criminal offense.

The stalking or harassment, on the other hand, is also considered a computer crime when bullying occurs steadily towards the victim. The wrongdoer, in this vessel, watches over, pursues and even contacts the affected person, seriously altering the development of their daily life and limiting their freedom. The most common channels where this type of crime takes place are social networks, WhatsApp groups  and other similar applications and cloud storage.

How to Protect Yourself from Cybercrime?

Here we are trying to tell you some tips for protecting yourself against cybercrime:

a)     Do not share passwords with anyone and use one for each service and application.

b)    Avoid connecting to public Wi-Fi or from computers in libraries, hotels, squares, theaters, etc.

c)     Do not use public charging terminals or connect unknown devices to personal equipment.

d)    Review application permissions before installing.

e)     Do not send confidential data by email, SMS or by phone.

f)      Limit the information that is shared on social networks.

g)    Install an antivirus on each of the devices.

h)    Keep the operating system and applications updated.

i)      Check that the page address has the prefix 'https' and has a closed green padlock.

It is important to remember that in order to safeguard customer security, BBVA never requests any type of information by e-mail, through social networks, or by telephone. In case of receiving a phone call or e-mail, requesting personal information, do not respond or enter personal data or passwords.

Comments

Popular posts from this blog

HOW TO STAY UP TO DATE ABOUT KEEPING DATA SAFE?

COMPANIES INTERNET SECURITY

IS USING INTERNET SAFE?