Friday, June 1, 2012

6 Myths of Internet Security


We live online: We spent much of the day on the Internet and exchanged a lot of personal information this way, so we know how important it is to take precautions and implement measures to ensure our safety online.We know, for example, that with further technical advice and act with common sense, we can avoid many threats and outwit various types of attacks.However, in regard to measures to safely navigate the Internet, there are many myths as to dismantle these below.

Myth 1: Shopping on the Internet

Belief: If you do not buy products or contract services on the Internet, I can not become a victim of cybercrime.

Fact: Even people who do not buy or make Internet banking may be affected by cybercrime. Just one visit to an infected website, or even a Web site free of viruses, but with an advertisement infected, so your computer can be infected by a software program for illegal activities such as a bot or a Trojan horse.

Tip: Always use secure transactions when you transfer confidential information and make sure you are dealing with a trustworthy company.

Myth 2: Share keys with my family is safe

Belief: It is safe to let other people use my computer, or share with them my keys, provided they are members of my family or very trusted friends

Reality: Anyone can be a victim of an attack on the Internet. Cybercriminals use automated tools to send millions of fraudulent e-mails in hopes of finding a small number of vulnerable victims.They do not care who they have opened the way that allows them to infect a computer, whether adult or child, provided they be misled and make mistakes.Cybercriminals act quickly, and the slightest mistake is enough for them to open Pandora's box. It is preferable not share your passwords, even the access to the computer.

Tip: Choose strong passwords and keep them safe.

Myth 3: I'm not famous, no one will steal my identity

Belief: The Internet is so big that you should not worry about things like identity theft. The probability of my becoming a victim is minimal, unless a public figure or famous person.

Fact: automated bot programs made constant raids on the Internet for new victims to become infective.Even if you're not someone famous, or try to go unnoticed on the Net, this relentless variety of crimeware will test the security of your computer.Furthermore, the volume of phishing scam emails sent each day is so high that it is very likely that sooner or later, you receive a fake message ... While Internet users who frequently use are more likely to become victims, anyone using the Internet is exposed to threats.Tip: Beware of messages from unknown users, and remember that offers that seem too good to be true usually are not true.

Myth 4: I have a firewall, I'm sure

Belief: I am protected against identity theft on the Internet if I have a firewall that blocks intruders, hackers and criminals.

Fact: The firewall software is an excellent first step in the task of protecting your computer, but is only the first line of defense.In fact, the software alone is unable to fully protect against online identity theft, since attacks today may incorporate a psychological aspect to trick the victim into revealing confidential information in place to exploit a flaw software.

Tip: Install protective software on your computer and keep it updated. Never send personal information (credit card numbers, passwords, etc..) In an email.

Myth 5: The photographs are free of viruses

Belief: Not all programs are at risk: For example, it is impossible that the photographs contain malicious code.

Fact: Many of the recent software problems are caused by attackers sent to victims of attack code embedded in image files such as photos.The attack occurs when the victim is browsing the Internet or reading e-mail and finds a web page or a message containing the contaminated photography: When viewing the photo, the attack code executes and infects the victim machine with crimeware.

Tip: Check the authenticity of the attachments before opening them.

Myth 6: If you use Windows, I'm sure

Belief: People who do not use Microsoft Windows are safe. Criminals take advantage of Windows users because they are easy prey, while leaving calm to Linux users and Mac

Reality: While users of Microsoft Windows are certainly Internet users who receive the highest number of attacks, people who use other operating systems or software are not immune to soft failures or fraudulent attacks.Recent cases of virus for Mac, for example, demonstrate that choosing other software is not sufficient to eliminate the risk of online attack. In addition, many of today's attacks, such as phishing, operate independently of the software package being used.

Tip: Keep the list of recommendations to protect your Mac that you bargained for here.

Recommendations

You see, there are many myths about Internet security. The good news is that while the Internet there are many threats, we have no reason to deprive us of using technology to facilitate our daily tasks: The key is to take precautions to safely navigate the Internet, the advice to share with you here.Thus, the general recommendation is to use common sense and take advantage of that offer specific products to protect the network as Norton Internet Security, which offers advanced protection for surf, bank, shop online without interruptions and contact your friends in social networks without worry: What are you waiting for protecting what matters most to you?

1 comment:

  1. AnonymousJune 18, 2012

    Really helpful post.
    Thank you

    ReplyDelete