Safe, Positive Use of Digital Technology with Symantec & Norton

This 9th February marks Safer Internet Day. On this day, we are reminded of our role in creating a better internet environment for ourselves and our loved ones through safe, responsible and positive use of digital technology. To kick off the occasion, Symantec and Norton offer the following facts and tips for safe and responsible use of online technology.

Did You Know that your devices can be held hostage 

Using crypto ransomware, cybercriminals can hold a victim’s file, photos and other digital media hostage and demand ransom. Our smart devices and wearables hold plenty of personal information which could lead to new opportunities for ransomware attacks.
Having your email or social media account compromised can lead to further attacks on your friends and loved ones
Cybercriminals use stolen email or social media accounts from one victim to spear-phish – in other words, lure their next victim. After all, we are more likely to click something posted by a friend.



Many of us are vulnerable online

Less commonly used devices, such as our connected home devices, are less likely to be protected. With the Internet of Things, many of our devices are inter-connected, increasing the importance of securing all our devices. Unfortunately, 62% admit they use bad passwords and 22% of consumers globally share their passwords with others for their email, social media and banking accounts.

Our online security behavior might be compromising our safety
Despite concern and awareness of cybercrime, consumers are overconfident in their online security behaviors. When asked to grade their security practices, they consistently award themselves a solid “A.” But in reality, most are not passing the most basic requirement of online security: password use. While people are overly bullish about their own security knowledge, fear is prevalent. 80% feel the chance of being an online crime victim is significant enough to worry about.

Cybercriminals are becoming more sophisticated

5 in 6 large companies were hit with targeted attacks in 2014, a 40 percent increase over the previous year. There have been cases where cybercriminals craft an email, purporting to be from the target organization’s CEO, asking the recipient to carry out an urgent wire transfer. These are also known as business email compromise (BEC) scams, also referred to as “whaling” because they send spear-phishing emails to senior (usually C-level) employees

Tips on online protection

Be cautious on social media: Don’t click links in unsolicited email or social media messages, particularly from unknown sources. Scammers know people are more likely to click on links from their friends, so they compromise accounts to send malicious links to the account owner’s contacts.
Know what you’re sharing: When installing a network-connected device, such as a home router or thermostat, or downloading a new app, review the permissions to see what data you’re giving up. Disable remote access when not needed.

Use strong passwords: This cannot be emphasised enough. Use strong and unique passwords for your accounts and devices, and update them on a regular basis—ideally every three months. Never use the same password for multiple accounts.

Familiarize yourself with the proper office procedures: Question any emails requesting actions that seem unusual or aren’t following normal procedures. In fact, don’t reply to emails that seem suspicious. Obtain the sender’s address from the corporate address book and ask them about the message.  

Share this

Related Posts

Previous
Next Post »

February 7, 2016

Safe, Positive Use of Digital Technology with Symantec & Norton

| |

This 9th February marks Safer Internet Day. On this day, we are reminded of our role in creating a better internet environment for ourselves and our loved ones through safe, responsible and positive use of digital technology. To kick off the occasion, Symantec and Norton offer the following facts and tips for safe and responsible use of online technology.

Did You Know that your devices can be held hostage 

Using crypto ransomware, cybercriminals can hold a victim’s file, photos and other digital media hostage and demand ransom. Our smart devices and wearables hold plenty of personal information which could lead to new opportunities for ransomware attacks.
Having your email or social media account compromised can lead to further attacks on your friends and loved ones
Cybercriminals use stolen email or social media accounts from one victim to spear-phish – in other words, lure their next victim. After all, we are more likely to click something posted by a friend.



Many of us are vulnerable online

Less commonly used devices, such as our connected home devices, are less likely to be protected. With the Internet of Things, many of our devices are inter-connected, increasing the importance of securing all our devices. Unfortunately, 62% admit they use bad passwords and 22% of consumers globally share their passwords with others for their email, social media and banking accounts.

Our online security behavior might be compromising our safety
Despite concern and awareness of cybercrime, consumers are overconfident in their online security behaviors. When asked to grade their security practices, they consistently award themselves a solid “A.” But in reality, most are not passing the most basic requirement of online security: password use. While people are overly bullish about their own security knowledge, fear is prevalent. 80% feel the chance of being an online crime victim is significant enough to worry about.

Cybercriminals are becoming more sophisticated

5 in 6 large companies were hit with targeted attacks in 2014, a 40 percent increase over the previous year. There have been cases where cybercriminals craft an email, purporting to be from the target organization’s CEO, asking the recipient to carry out an urgent wire transfer. These are also known as business email compromise (BEC) scams, also referred to as “whaling” because they send spear-phishing emails to senior (usually C-level) employees

Tips on online protection

Be cautious on social media: Don’t click links in unsolicited email or social media messages, particularly from unknown sources. Scammers know people are more likely to click on links from their friends, so they compromise accounts to send malicious links to the account owner’s contacts.
Know what you’re sharing: When installing a network-connected device, such as a home router or thermostat, or downloading a new app, review the permissions to see what data you’re giving up. Disable remote access when not needed.

Use strong passwords: This cannot be emphasised enough. Use strong and unique passwords for your accounts and devices, and update them on a regular basis—ideally every three months. Never use the same password for multiple accounts.

Familiarize yourself with the proper office procedures: Question any emails requesting actions that seem unusual or aren’t following normal procedures. In fact, don’t reply to emails that seem suspicious. Obtain the sender’s address from the corporate address book and ask them about the message.  

0 comments:

Tech-related Tags

abenson abs-cbn mobile abs-cbn tv plus acer adspark airborne technologies alcatel allphones allwinner amd amlogic android android one ansons AOC apple arc mobile asus audio technica avant axions ballistic beyond the box blackberry Blackview bluelounge boompods braven brother bs mobile cannice canon carmudi cd r king cherry mobile cherry prepaid ckk mobile cloudfone cloudpad cmk cellphones coloud corning cubix dell devant digital walker digits trading ding ding technology dropbox dtc easy taxi edge hd ekotek exynos facebook firefly mobile firefox os fortinet fujidenzo fukuda gigahertz gionee globe grab grabexpress grabheli grabjeep grabtaxi hanabishi hisense honeywell honor hoomia hoomia earphones hooq hotel quickly hp htc huawei hyundai ibm idc iflix infinix infocus instagram intel ios iphone itunes jabra jobstreet kalibrr karbonn kata ken xin da kickstart ventures kimstore kingcom kirin konsulta md lamudi lazada leadcore lenovo level-up games lg line link messenger marshall mec mediatek meizu memoxpress microsoft microsoft lumia move msi-ecs myphone neo netflix nikon nokia novo 7 tech o+ olx philippines onda onemos onkyo oppo paymaya pc worx philips pineng pldt fibr pldt home power mac center powerocks prestigio prestiz promate pyxis qnet mobile qualcomm qube razer redfox remix mini remix mobile rockchip royqueen samsung shopify siena mobile skk mobile smart smart bro sony Soundfreaq spinnr spotify starmobile sun cellular talk n' text TCL tdk tech21 techbox philippines telego the diff thl tm torque twitter uber urbanears viber10 villman wellcom western digital widget city windows WSI xiaomi yoobao z h & k mobile zopo ZTE zuk