Are you protecting your identity? Do you practice safe surfing so that your critical information is protected? Don’t make the mistake of thinking that hackers aren’t interested in you. They are. According to Cisco’s 2018 Report:
Based on a survey of 3,600 chief security officers and security operations leaders from all over the world, the report talked among other things, about the increased sophistication of malware/ransomware attacks.
For one, these malware can spread across a network like worms without the need for any human action like opening email, downloading, etc.
Also, cyber criminals are using encryption to mask command-and-control activity. The researchers noted a 3X increase in encrypted network communication used by inspected malware samples over 12 months. Around 70% of the 400,000 inspected malicious binaries from the last five months used encryption.
Moreover, they are using legitimate Internet services to more easily attack users (in the cloud computing era, it is more difficult to cut off major services like Google and Dropbox).
The report also cautioned against companies adopting IoT devices too quickly without adequately securing them. As they rapidly deploy IoT devices, companies often lose track of the number of end point devices on their networks, which increases their vulnerability to attack. IT departments are also relaxed in their approach to end point security and often don’t take action until catastrophe hits.¹~Sejuti Banerjea; Zacks
Curious as to how or why people are the weakest link in the security chain? Let’s talk about passwords for a minute. Did you know that it only takes 2 minutes to crack a 9-character password?2 Do you share your passwords? (Bad idea!)
Ever think about the amount of information that could be harvested from an unsecured computer?2 If not, you should.
These are just a few, simple user behaviors that are incredibly easy to change, yet make a really big difference in protecting yourself and/or your business in the cybersecurity arena.
“There are two kinds of companies: those who have been breached and those who don’t know they’ve been breached.”— former Cisco CEO John Chambers
Our “Stay Safe, Secure and Sure Online” course covers the following topics:
- brief overview of online security
- the difference between antivirus and firewall software, why you need both, and the best brand to buy
- spyware and malware protection
- all about passwords
- browser breaches and how to avoid them
- how to centralize and encrypt your passwords
- surfing the net securely
- how to uncover and avoid phishing scams
- what to do if your identity has been stolen
Remember the old saying “an ounce of prevention is worth a pound of cure”? Don’t wait until your security and privacy have been compromised! Start your plan to stay safe, secure and sure online today.
¹Banerjea, Sejuti. “Cisco Roundup: Cybersecurity Report 2018, Trade War Impact.” Yahoo Finance – Business Finance, Stock Market, Quotes, News, 14 Mar. 2018, finance.yahoo.com/news/cisco-roundup-cybersecurity-report-2018-182206590.html. Accessed 26 Aug. 2018.
2 Atwood, Jeff. “Your Password is Too Damn Short.” Coding Horror, 23 Apr. 2015, blog.codinghorror.com/your-password-is-too-damn-short. Accessed 26 Aug. 2018.
3 eSecurity Planet, “Theft of Unencrypted Laptop Exposes 100,000 Social Security Numbers”, esecurity.com: https://www.esecurityplanet.com/network-security/theft-of-unencrypted-laptop-exposes-100000-social-security-numbers.html. August 17, 2015.