fbpx

Cybersecurity

why do we need cybersecurity

Why Do We Need Cybersecurity?

why do we need cybersecurity

Why Do We Need Cybersecurity?

task virtual assistant
Wednesday, November 30, 2022 is Computer Security Day and I want to answer the question:

Why do we need cybersecurity?

"Data Breach",  XYZ Company Hacked", "Your information has been compromised"...these are just a few common headlines we are so used to seeing today we've become blind to them. We need to become more aware; we need to take a more active approach to our individual cybersecurity, as well as our business.
Cybercriminals can make changes in a system without being detected by antivirus, and they know about the software vulnerabilities. They are smart and find ways to get into our systems and create havoc in less time than we expect. One of the most common transgressions is phishing or social engineering--deliberately trying to get you, a family member, or an employee to download malware or give up their credentials by pretending to be someone they trust. Security experts predict that these malicious activities will only increase in the future, so this is a serious issue that needs our full attention.
Still asking why we need cyber security? Woman Shrugging on Facebook 13.1 Here are five pretty good reasons why:

Reason #1

Hackers are everywhere; your business rival, your neighbor, or simply a person out to take over your computer. Hackers make use of software loopholes and hijack your computer through backdoors, usually installed programs, or through cracking software. They can gain access to possibly all your personal and sensitive information such as bank accounts, credit cards, or top trade secrets. They can also use your computer to attack other networks, with you oblivious to all the malicious operations.

Reason #2

Internet scams and frauds are rampant. These include phishing, a very organized cybercrime, which deceives people into giving their banking and other sensitive details by pretending to be representatives from legitimate financial institutions, sending e-mail messages, and asking unsuspecting people to verify their passwords, account numbers, and other vital information.

Reason #3

A virus can slow down your computer. Worse, it can cause your system to crash. The virus reaches your system through a number of entryways. One is through unsecured and unknown websites from which you download files, programs, applications, or tools for free. As much as it can infect home computers, viruses can leave damaging effects on companies, both big and small.

Reason #4

Spyware, as the name hints, can spy on you. A computer program automatically installed on your computer, spyware tracks personal information you entered and sends it to its creator. Unlike computer viruses, spyware leaves the computer owners totally unaware of its presence. Most users with infected systems don’t even know that spyware has been installed into their computers.

Reason #5

Adware can fill your screen with those annoying popups. Like spyware, adware penetrates the system through shareware. On its own, it downloads ads and allows them to run and pop up. This proves to be quite annoying for computer owners. But what’s even more troubling is that adware can sometimes contain spyware. This increases the risk for cyber threats.

Computers today are faster and more advanced, and so are the cyber bad guys trying to gain access to your information. Computer Security Day reminds us to protect our computers. The nature of the Internet as a tool for communication and education has been used and misused for personal gain, which has resulted in an unprecedented rise in cybercrime rates. We need Cybersecurity to protect our people and data from threats like ransomware and hackers. The threats are real and they happen more often than we think.

So take a few minutes today to review your cybersecurity habits. Use the #ComputerSecurityDay checklist below to secure your computer.

Enable Windows Update.

Install and keep running antivirus software.

Turn on Windows Firewall.

Keep all software updated. 

Always use strong passwords.

Don’t share passwords and don’t write them down. 

A password is required to access my computer.

Remove unused programs.

Secure your wireless network. 

Back up critical data. 

Use caution when browsing the Internet. 

I log off the computer when I’m not using it.

My web browser does not store or remember my passwords.

Periodically remove temporary Internet files.

Spread the word on social media using #ComputerSecurityDay to inform others how they can secure their data!

 

cybersecurity
For more information on how you can protect yourself, your family, and your home-based business, grab my e-course "Cybersecurity for the Remote Office". Get it today and use Coupon Code: CSD2022 for a 30% discount!
Day
Hour
Minute
Second
cybersecurity

Anatomy of a Data Breach

cybersecurity

Anatomy of a Data Breach

virtual assistant

Arguably no phrase has dominated the tech world in the last 24 months more than the term "data breach." The past two years have been saturated by headlines of cybersecurity mishaps, from breaches that have impacted critical infrastructure like the Colonial Pipeline to hackers compromising healthcare records at UC San Diego Health. Yet, despite the prevalence of the breach-centric news cycle, many everyday individuals may not know what a data breach is, how they typically start, and why they occur.

According to IBM, the average time it takes to identify that a breach has occurred is 287 days, with the average time to contain a breach clocking in at 80 days. And with 81% of businesses experiencing a cyberattack during COVID, individuals must be familiar with the anatomy of a data breach to keep their data and their client's data safe.

With that in mind, here is some helpful background on data breaches and why they are so problematic.

What is a data breach? 

While it may seem complex, a data breach is straightforward to explain once you clear away the jargon fog. According to Trend Micro, a data breach is "an incident where information is stolen or taken from a system without the knowledge or authorization of the system's owner." And while data breaches can result from a system or human error, a vast majority of data breaches result from cyber attacks, where a cybercriminal gains unlawful access to sensitive system data. For example, 92% of the data breaches in Q1 2022 resulted from cyberattacks.

What kind of data can be breached?

Unfortunately, cybercriminals look to get their hands on any information they can, ranging from more sensitive information such as social security numbers and credit card information to more obscure data like past purchase history.

What are some of the tactics used to execute data breaches?

Cybercrime is getting more sophisticated each day. However, cyberattack tactics do not have to be cutting-edge or advanced to be effective. Here are a few examples of popular tactics used by cybercriminals:

  • Phishing: Phishing is when a cybercriminal pretends to be a legitimate party in hopes of tricking an individual into giving them access to personal information. Phishing is one of the oldest tricks in the book for cybercriminals, but it is just as effective as ever. For example, 80% of security incidents and 90% of data breaches stem from phishing attempts.
  • Malware: Another tried-and-true method for cybercriminals is malware. Malware is malicious software that secretly installs itself on devices – often by a user engaging with fake links and content – and quietly gains access to the data on an individual's device or a business network.
  • Password Attack: Through password attacks, cybercriminals seek access to sensitive data and networks by "cracking" user passwords and using these credentials to get into networks and extract data from a given network.

The best way to stop a data breach is to stop it before it even starts. This includes taking steps from making sure passwords are long and complex to reporting all suspicious emails. If you suspect you have been the victim of a breach, immediately contact your IT department or device provider to notify them and follow subsequent protocols to help them scan, detect, and remediate any issues.                                      

For more information on protecting your data, your client’s and your family, visit our Cybersecurity page.

CYBERSECURITY

4 Easy Steps to Keep You Secure

CYBERSECURITY

4 Easy Steps to Keep You Secure

virtual assistant

Cybersecurity has become one of the biggest hot topics inside and outside technology circles over the last two years. From securing learning devices due to a rise in digital learning during the COVID-19 pandemic to coping with the fallout of high-profile breaches of national infrastructure such as the Colonial Pipeline, there is a seemingly endless news cycle dedicated to cybersecurity mishaps and concerns.

And with this onslaught of negative news, it can be easy for everyday individuals to become overwhelmed and feel powerless in the face of the “insurmountable” threats posed by cybersecurity. But in actuality, nothing could be further from the truth.

With all of the jargon that is typically thrown around about cybersecurity, there is a longstanding misperception that cybersecurity is beyond everyday people and that it should be left to professionals. Moreover, there is a prevailing sense among the public that breaches are simply a fact of life and that we should just learn to deal with them. But this just isn’t true. In fact, everyday people have a huge role to play in cybersecurity threat prevention, detection, and remediation. For example, according to IBM, 95% of breaches have human error as the main cause. Therefore, everyday technology users are very much the first line of defense when thwarting cybercrime. Unfortunately, many individuals are unaware of some of the best practices for boosting cybersecurity and how easy they are to use.

With that, here are a few key best practices that everyday people can implement today to enhance their own cybersecurity and create a more secure world for everyone.

Watch Out for Phishing

Phishing – when a cybercriminal poses as a legitimate party in hopes of getting individuals to engage with malicious content or links – remains one of the most popular tactics among cybercriminals today. In fact, 80% of cybersecurity incidents stem from a phishing attempt. However, while phishing has gotten more sophisticated, keeping an eye out for typos, poor graphics, and other suspicious characteristics can be a telltale sign that the content is potentially coming from a “phish.” In addition, if you think you have spotted a phishing attempt, report the incident so that internal IT teams and service providers can remediate the situation and prevent others from possibly becoming victims.

Update Your Passwords and Use a Password Manager

Having unique, long, and complex passwords is one of the best ways to immediately boost your cybersecurity. Yet, only 43% of the public say that they “always” or “very often” use strong passwords. Password cracking is one of the go-to tactics that cybercriminals use to access sensitive information. And if you are a “password repeater,” once a cybercriminal has hacked one of your accounts, they can easily do the same across all of your accounts.

One of the biggest reasons that individuals repeat passwords is that it can be tough to remember all of the passwords you have. Fortunately, by using a password manager, individuals can securely store all of their unique passwords in one place. Meaning, you only have to remember one password. In addition, password managers are incredibly easy to use and can automatically enter stored passwords when you visit a site.

Enable MFA

Enabling multi-factor authentication (MFA) – which prompts a user to input a second set of verifying information such as a secure code sent to a mobile device or to sign-in via an authenticator app – is a hugely effective measure that anyone can use to drastically reduce the chances of a cybersecurity breach. In fact, according to Microsoft, MFA is 99.9 percent effective in preventing breaches. Therefore, it is a must for any individual that is looking to secure their devices and accounts.

 Activate Automatic Updates

Ensuring devices are always up-to-date with the most recent versions is essential to preventing cybersecurity issues from cropping up. Cybersecurity is an ongoing effort, and updates are hugely important in helping to address vulnerabilities that have been uncovered as well as in providing ongoing maintenance. Therefore, instead of trying to remember to check for updates or closing out of update notifications, enable automatic update installations whenever possible.

cybersecurity

10 Tips to Keep Your Online Environment Safe

cybersecurity

10 Tips to Keep Your Online Environment Safe

virtual assistant

There are a lot of new opportunities for hackers. New ways to enter your business or home virtually and steal your data, your clients data, your personal information, and even spy on you! You can protect yourself significantly just by following these ten tips.

1. Stay Off Public Wi-Fi

Public Wi-Fi is not secure and is a hacker's playground. They can set up a look-a-like network, hoping you'll connect to it, they can intercept your data, and even create fake Wi-Fi access points. Once you've connected to their network, they can see what you see—going to check your balance in your checking account? And now, they have your password and account information. They can also get any information you have stored on your device. When you're out of the house and need to connect, it's always better to use your service provider's network. There may be a fee, but what is your data worth to you?

2. Use a VPN

Maybe you're in public often and rely on public Wi-Fi? If so, I suggest signing up for a virtual private network (VPN) to ensure your data is safe on an unsecured network. Many VPN providers have free trial periods. TechRadar lists the Best VPN Services in 2022. Your Internet Service Provider may also have a VPN service as well.

3. Best Router Practices

I really wish router manufacturers would require manual set up rather than being ready-to-use right out of the box. The default router settings are very common, it's like using "password" for your password. We'll talk about that later. So what are some of the things you can do to make your router secure?

  • Rename the admin account and change the password
  • Create a unique network name (SSID), do no use the default name
  • Turn on encryption, use WPA2
  • Hide your network from anyone doing a random search
  • Place your router in a central location, away from windows and doors, and exterior walls.

4. Use Complicated Passwords

Avoid simple passwords. Using “password” might be easy for you to remember, but that is the first word a hacker will try. Most sites now require a combination of upper and lower case letters, numbers, and special characters. Creating a complicated password is a good rule of thumb, even if the site doesn’t require it.  In general, a good password is at least eight characters long, but the longer, the better. The best password is 25 characters.  Another good practice is to form a password from a phrase. For example, you can create t1$!C4gtMpSd from “This is so I can’t forget my password.” You can use multiple methods to help you form unique and cryptic passwords.

5. Use a Firewall

Most routers will contain a built-in firewall that will protect and prevent any network attacks from intruders.  The default setting is typically disabled, so be sure to confirm that your router's firewall is on.

6. Keep Security Software Updated

Just like technology moves at a fast pace, so does malware. Your Anti-Virus and malware software is only as good as the latest update. If you are not updating regularly, you are putting your computer and any other device on your network at risk. I recommend setting a schedule for the updates to run, preferably during non-peak usage times, as they can be resource-heavy.

7. Protect All Connected Devices

Your computer is not the only device at risk. Keyloggers, spyware, viruses, etc. can also infect your smartphone, Xbox, Playstation, tablet, iPad, pretty much anything connected to your network is at risk and must be protected.

Ensure all devices are behind your home router/firewall to protect them from unrestricted access from the Internet.

8. Scan External File Storage

Run your anti-virus scan on all USB drives and other external file devices before you open any files. Keyloggers are often passed on by a thumb drive. You open the infected file and it secretly installs on your computer and sends every keystroke to the hacker.

9. Look for the S 

Always make sure you are on a secure site before transmitting any personal or sensitive information. Just look at the address bar for the locked padlock, and make sure the website address has an S. For example, http://notsecure --> https://secure

10. Backup! Backup! Backup!

Perform regular backups. How often you schedule the backup to run depends on how often you make changes or add files. Having a backup is not just good common sense, but it can save you a lot of time and trouble should you ever be faced with a ransomware attack. I store all my backups in the cloud, and on an external drive.  I do a full back up monthly, and nightly file backups. Take it from someone who has lost all their information, it can happen to you!

Did you know that every single year, about 70% of the US population experiences SOME form of cyber-attack. The truth is, 99% of computers ARE vulnerable to cyber-attacks.

Click here to take our quiz and find out how cybersmart you are!