Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    FTX Claims Trading Near 35% of Debt Amount in Secondary Markets

    September 22, 2023

    Azerbaijan troops ‘all around’ Nagorno-Karabakh separatist stronghold | Conflict News

    September 22, 2023

    Wisconsin heads to Purdue as a 5.5-point favorite

    September 22, 2023
    Facebook Twitter Instagram
    • About Us
    • Contact Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Facebook Twitter Instagram Pinterest Vimeo
    Weis
    • Home
    • Crypto
      1. Cryptocurrency Live Price
      2. View All

      FTX Claims Trading Near 35% of Debt Amount in Secondary Markets

      September 22, 2023

      Azerbaijan troops ‘all around’ Nagorno-Karabakh separatist stronghold | Conflict News

      September 22, 2023

      Wisconsin heads to Purdue as a 5.5-point favorite

      September 22, 2023

      Australia Revisits What Worked, and Didn’t, in the Pandemic

      September 22, 2023

      FTX Claims Trading Near 35% of Debt Amount in Secondary Markets

      September 22, 2023

      Bitcoin's Role in Russia-Ukraine Conflict to Take Center Stage in DC

      September 22, 2023

      Bankrupt Core Scientific to Buy 27K Bitmain Servers for $77M in Cash and Stock

      September 22, 2023

      India to develop dark net monitoring tool to combat crypto fraud: Report

      September 22, 2023
    • Insurance

      Aon Taps Carpenter’s Fraccalvieri to Lead EMEA Facultative, Reinsurance Solutions; Miller Launches APAC Treaty Team

      September 22, 2023

      EU and UK Solvency II reviews to proceed amid shifting economic landscape: Fitch

      September 22, 2023

      California unveils landmark sustainable insurance strategy

      September 22, 2023

      Copper Producer Aurubis Says Metal Scam Cost It €185 Million

      September 22, 2023

      Andrew Symons joins DWF London Global Risks team as insurance partner

      September 22, 2023
    • International News

      Australia Revisits What Worked, and Didn’t, in the Pandemic

      September 22, 2023

      Muslim MP called ‘terrorist, pimp’ by BJP member inside India’s parliament | Islamophobia News

      September 22, 2023

      India’s Parliament passes law that will reserve a third of legislature seats for women from 2029

      September 22, 2023

      Pope Francis, migration and the issue of ethics – DW – 09/22/2023

      September 22, 2023

      Pope to arrive in Marseille with message of tolerance amid EU migrant crisis

      September 22, 2023
    • Politics

      Azerbaijan troops ‘all around’ Nagorno-Karabakh separatist stronghold | Conflict News

      September 22, 2023

      Missouri senator says he would torch ‘woke pornographic books’ after false claims of book burning at GOP event

      September 22, 2023

      Tories accuse Starmer of ‘flip-flopping’ over EU following claims Labour wants to undo Brexit – UK politics live | Politics

      September 22, 2023

      Giuliani dodged paying legal fees in election worker defamation case, attorneys claim

      September 22, 2023

      Pentagon determines Ukraine training and support exempt from potential government shutdown

      September 22, 2023
    • Sports

      Wisconsin heads to Purdue as a 5.5-point favorite

      September 22, 2023

      Andrew Luck Dresses as 'Capt. Andrew Luck' on 'Thursday Night Football'

      September 22, 2023

      NFL’s Best Skill-Position Group Powers 49ers on TNF, Shows Why SF Is Title Contender | News, Scores, Highlights, Stats, and Rumors

      September 22, 2023

      United States 3-0 South Africa (Sep 21, 2023) Game Analysis

      September 22, 2023

      Martin Odegaard: Arsenal captain signs new five-year contract until 2028 | Football News

      September 22, 2023
    • Tech

      Free Kindle Unlimited: 3 months free for Prime members (UK)

      September 22, 2023

      The Bizarre Cottage Industry of YouTube Obituary Pirates

      September 22, 2023

      The next Windows 11 update adds public passkey support

      September 22, 2023

      Threads adds easy profile switching to its mobile apps

      September 22, 2023

      Incomplete disclosures by Apple and Google create “huge blindspot” for 0-day hunters

      September 22, 2023
    • Shop
    Subscribe
    Weis
    Home»Tech»6 simple cybersecurity rules to live by
    Tech

    6 simple cybersecurity rules to live by

    AuthorBy AuthorSeptember 12, 2023No Comments6 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    computer virus

    SEAN GLADWELL/Getty Images

    Whether you’re an IT pro or a serious PC hobbyist, computers are as logical as Mr. Spock. If you are someone without a technical background, a common Windows error message can also be written in Klingon.

    For later viewers, computer security often turns into magical thinking. That’s unfortunate because the truth is that most of the things you can do to protect yourself online are about simple psychology and basic human behavior.

    Also: Today’s best VPN service: Expertly tested and reviewed

    When a business network is compromised by ransomware, the culprit is rarely an evil genius hacker. The source of the problem is often more mundane: Someone has been fooled by a clever bit of social engineering.

    For anyone responsible for training others to avoid being victimized online, the secret is not to explain how to buffer overflow and code injection.

    Instead, help people focus on how to approach the PCs with a healthy dose of skepticism and build some basic situational awareness. I reduced the lesson plan to six simple rules, all written in plain language.

    1. Don’t panic

    A grizzled veteran of the computer security industry once shared a valuable piece of wisdom with me: “Don’t just do something. Stand there.”

    Oh, wait. That’s not a security expert, it’s the White Rabbit in Disney’s 1951 animated production. Alice in Wonderland. But still good advice.

    Also: This AI-generated crypto invoice scam almost got me, and I’m a security pro

    The natural human reaction when you see a potential threat is to panic and take immediate action do something to solve it. If you receive an email alerting you that your credit card is about to be charged $480 to renew your expired Geek Squad subscription or that your computer has been infected with ransomware, you may be tempted to call the toll-free number in that email. That, of course, will connect you to a call center staffed by bad actors who will happily take your credit card details and process some real charges.

    Scammers thrive by making people panic. Take the time you need to find out what the real threat is before you do anything.

    2. Do not open unknown attachments

    Many potential security threats come in the form of email attachments. Sometimes these are executable files, but these days they tend to be Word documents, PDF, or HTML files. They may be able to run exploit code, or it may simply be an attempt to convince you to enter credentials for an email or bank account.

    When you receive an attachment from someone you don’t know, the last thing you should do is open it. Even if the attachment appears to be from someone you know, it’s worth being careful, especially if the message is unexpected. The sender’s account information may be spoofed, or their account may be compromised.

    Also: The best security keys of 2023

    If you suspect that an attachment is harmful or if a message contains a link to a suspicious site, consider uploading it to Virus Total (https://virustotal.com). That free, reliable site (owned by a subsidiary of Google) scans your submission against 70 antivirus engines and a variety of security-related services and can notify you when detected. -an it is malicious or it is a false positive.

    3. Also don’t click on unsolicited links

    Social engineering works by exploiting people’s trust. A scammer who puts even a little effort into a phishing attempt can do a credible job of impersonating a legitimate email and creating links that are close enough to the real thing to trick you.

    When you get an email that makes you think, “Hmmm, that’s not right,” your spidey sense is at work. Trust it.

    And even if the message doesn’t have any obvious red flags, it’s still OK to be suspicious, especially if you’re being asked to click a link to do something you didn’t ask for. When in doubt, don’t click on the link; instead, use the bookmark you saved for the site in question or type the URL directly to do whatever you need to do.

    4. You don’t need to pay for security software

    The security software industry wants to scare you. As part of that effort, they try their best to convince you that the core protections built into your PC, Mac, or mobile device may not be as good as the product they’re selling.

    Also: Scammers use AI to impersonate your loved ones

    That may have been true two decades ago, but it is not true today. Most third-party security software developed for consumer use only offers little additional protection, at best. That’s especially true for buzzy features like “Dark Web monitoring.”

    If you are a business network administrator, you can benefit from software and services that give you greater visibility into what your users are doing as well as what is happening at the periphery of your network. For your personal PC, save your money.

    5. Don’t mess with a perfectly good PC (or Mac)

    When it comes to keeping your computer safe, I disagree with the classic management advice: “If it ain’t broke, don’t break it.”

    Driving exploits may grab all the headlines, but the sad truth is that most malware ends up on PCs because someone willingly, even eagerly, chose to install it.

    Maybe they downloaded a cracked program from a sketchy download site, or maybe they followed a sponsored link from a search engine and downloaded a program that included a bunch of adware or even malware. in addition to the app they are looking for.

    Also: Concerned about privacy? Store Tails on a USB drive and save most of any computer

    The obvious solution? Do not install random apps.

    If you need to test a program, and you have Windows 11 Pro or Enterprise, try running it in Windows Sandbox. If you’ve never heard of this feature, here’s how I described it when Windows 11 was released:

    It allows you to easily spin up a secure virtual machine without any complicated setup. The VM is completely isolated from your main system, so you can visit a suspicious website or try an unknown app without risk. When you are done, close the sandbox, and it will disappear completely, removing all traces of your experiment.

    This is a killer feature, and one you should be aware of.

    6. Use a password manager

    I’ve been pounding the table about password managers for years, so I won’t repeat those arguments here. (If you need a refresher, read this: “Forgot password? Five reasons why you need a password manager.”)

    But the facts are indisputable: People are terrible at generating random passwords, and it’s literally impossible to remember the kinds of strong, unique credentials that can protect you.

    Also: The best password manager

    In fact, using a password manager makes navigating the modern internet easier and you are safer. If you’ve been putting off this task because you think it’s too hard, try my three-step program, which you can implement in 30 minutes or less.

    Oh, and while you’re at it, turn on two-factor authentication too.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleNew Mexico sheriff says he won’t enforce ‘unconstitutional’ gun ban: ‘Protecting the Second Amendment’
    Next Article Extreme Heat Threatens Global Fuel Security
    Author
    • Website

    Related Posts

    Tech

    Free Kindle Unlimited: 3 months free for Prime members (UK)

    September 22, 2023
    Tech

    The Bizarre Cottage Industry of YouTube Obituary Pirates

    September 22, 2023
    Tech

    The next Windows 11 update adds public passkey support

    September 22, 2023
    Add A Comment

    Leave A Reply Cancel Reply

    Top Posts

    FTX Claims Trading Near 35% of Debt Amount in Secondary Markets

    September 22, 2023

    Tablet PC Market to Witness Exponential Growth by 2028, Sources Say

    January 11, 2020

    Save $25 on Philips Wired Headphone For A Great Sounding Over-Ear Headphone

    January 12, 2020
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Crypto

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    AuthorJanuary 15, 2021
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    AuthorJanuary 15, 2021
    8.9
    Uncategorized

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    AuthorJanuary 15, 2021

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    FTX Claims Trading Near 35% of Debt Amount in Secondary Markets

    September 22, 2023

    Tablet PC Market to Witness Exponential Growth by 2028, Sources Say

    January 11, 2020

    Save $25 on Philips Wired Headphone For A Great Sounding Over-Ear Headphone

    January 12, 2020
    Our Picks

    FTX Claims Trading Near 35% of Debt Amount in Secondary Markets

    September 22, 2023

    Azerbaijan troops ‘all around’ Nagorno-Karabakh separatist stronghold | Conflict News

    September 22, 2023

    Wisconsin heads to Purdue as a 5.5-point favorite

    September 22, 2023

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Type above and press Enter to search. Press Esc to cancel.