CYBER SAFETY

Today, we are more dependent on computers and the information that they store than ever before. From spyware, viruses, and Trojans to identity theft and computer hardware malfunctions — any disruption can have a huge impact on our lives. No matter how savvy the user, safe computing practices are a combination of physical protections using computer software and security settings and the secure actions of the user.1

  • MyDoom is considered to be the most expensive virus in the world and in cyber security history, having caused an estimated financial damage of $38.5 billion!
  • Like-Jacking occurs when criminals post fake Facebook “like” buttons to web pages. Users who click the button don’t “like” the page, but instead, download malware.
  • Link-Jacking is a practice used to redirect one website’s links to another which hackers use to redirect users from trusted websites to malware infected websites that hide drive-by downloads or other types of infections.
  • Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by disguising itself as a trustworthy entity in a Facebook message, Tweet or other social media message
  • Social Spam is unwanted spam content appearing on social networks and any website with user-generated content (comments, chat, etc.). It can appear in many forms, including bulk messages, profanity, insults, hate speech, malicious links, fraudulent reviews, fake friends, and personally identifiable information.3
  • Hackers attack every 39 seconds. 2
  • 1 in 3 Americans were hacked in the past year. 3
  • 43 % of cyber attacks target small business. 4
  • Cyber crime damage costs to hit $6 trillion annually by 2021. 5
  • The Scope of Identity Theft: The 2016 Identity Fraud Study found that $15 billion was stolen from 13.1 million U.S. consumers in 2015. 6
  • 99% of computers are vulnerable to software vulnerabilities .7
  • More than 600.000 Facebook accounts are compromised every single day8
  • 1 in 10 social media users said they’ve been the victim of a cyber attack. 8
  • 59% of employees steal proprietary corporate data when they quit or are fired. 8
  • Cybersecurity Fact: Oracle Java, Adobe Reader or Adobe Flash is present on 99% of computers. That means that 99% of computer users are vulnerable to exploit kits (software vulnerabilities). This is because the vulnerabilities that these types of software often present are extremely critical: all it takes is one click on an infected advertising banner to give a hacker full access to your computer.3
  • Detect suspicious applications running, popups, warning messages, etc.
  • Having someone break into your account or steal your password/personal information. 5
  • Download Microsoft Baseline Security Analyzer. This free tool examines your Windows and Office settings for any potential problems, especially contamination. It will alert you if the security on your computer is lacking. 6

Here are some tips that will help you protect your computer and ultimately, the information stored on it: 9

  • Keep your computer updated: Whether you choose to update your operating system software automatically or manually, we recommend making it a continuous process. Also, keep other software on your computer updated since it often includes essential bug fixes and security features that address existing vulnerabilities.
  • Enable the personal firewall on your computer: This will help to keep unauthorized people from snooping around your computer when it’s connected to the Internet.
  • Create strong, secure passwords: We recommend passwords that contain at least 8 characters with a combination of letters, numbers, and symbols. 
  • Keep personal information safe: Reduce your risk of identity theft by never sharing your personal information via email, no matter how official the email looks. Official business that requires personal information should not happen via unsecured email.
  • Scan email attachments and validate links: Scan all attachments that are sent to you. Viruses can lurk in emails from friends and family. If you receive a link in an email from a trusted source, hover over the link using your mouse and look in the bottom bar of your web browser to reveal the true URL and validate that the link is legitimate.
  • Log off any public areas: Remember when using a public computer or network, it is just that… Public! Be sure that you completely log off the site or machine when you are finished using it. Be especially mindful to un-check boxes that will remember your login information when logging into online services, such as email and bank accounts.
  • Limit information on social media sites: People will post almost anything on social media sites. For many people, birth dates, anniversaries, addresses, phone numbers, and a lot of other personal information can be found on social media sites. Protect yourself from identity theft and other scams by limiting what information you disclose online and who can see that information.
  • Avoid surfing websites that you don’t already know: Browsers are quickly becoming one of the larger vulnerabilities in computing. Adware and spyware are written specifically to exploit Internet Explorer and Firefox. So try and stick with the websites you trust.

RESOURCES​

To learn more, please visit Heimdal Security

Ever wondered how cyber attacks look on a global scale? Check out this real-time map put together by Norse