Why do we continue to see so many cyber breaches? If we look at why many of the breaches in recent years have occurred, we can identify three major culprits: The Human Factor, Identities and Credentials, and Vulnerabilities.
As a digital social society, we are sharing more information publicly, ultimately causing ourselves to be much more exposed to social engineering and targeted spear phishing attacks. The ultimate goal of these attacks is to compromise your devices for financial fraud, or to steal your identities in order to access the company you are entrusted with protecting. This has the potential to damage your own personal data in the process. Once your identity has been stolen the attacker can easily bypass the traditional security perimeter undetected. And if that identity has access to privilege accounts, they can easily carry out malicious attacks under your name.
As people -- or businesses -— power up devices and connect to the Internet to access online services, they risk becoming a target of cyber criminals and hackers. It is critically important to know how cyber criminals target their victims, what you can do to reduce the risk, and make it more challenging for the attackers who steal your information, your identity or your money.
Cyber threats can come from attackers using many different techniques, though what is clear is that people are on the frontline. It's crucial that you can identify the threats or know what to look for to determine if something is authentic or suspicious. It's important to learn these techniques -- being able to quickly identify a threat can make the difference between the destruction of your sensitive data and averting a major catastrophe. Yes, you can be the hero that prevented a cyber catastrophe so let's help you be prepared.
Tips on how to stay safe online and avoid becoming a victim of cybercrimes:
#1 Back up your files:
Make sure you take regular backups of your important files as this is the fastest and best way to recover from nasty malware like ransomware that encrypts all your files and makes them unavailable until you pay bitcoins. Having a backup will help you quickly get back up and running with little impact to your digital life. #2 Keep applications and systems up to date
Allow your applications and systems to get those much-needed security updates, and then allow your system to restart. This is one way to keep common cyber threats from easily accessing your devices and stealing your information, your digital identity and your money. #3 Use $rOng3r & [email protected] passwords and passphrases
When choosing a password/passphrase, make sure you choose a strong password that is unique to that account, and change it when you suspect suspicious activity. The average age of a social password today is years, and social media does a lousy job of reminding you how old your password is, how weak it is, and when it's a good time to change it. It's your responsibility to protect your account so protect it wisely. If you have many accounts and passwords use an enterprise password and privileged account vault to make it easier to manage and secure them. Never use the same password multiple times. #4 Use two-factor or multi-factor authentication
Make it difficult for cyber criminals to easily access your online accounts and steal your information by enabling and using two-factor or multi-factor authentication. Do not let a password be the only security control stopping cyber criminals. Two-factor and multi-factor deter cyber criminals end encourage them to move onto an easier target. #5 Beware of hyperlinks
We are a society of clickers; we like to click on things. For example, hyperlinks. Always be cautious of messages with a hyperlink and ask yourself: Was I expecting this? Do I know the person who is sending it? If in doubt, ask the person if they actually sent you something before clicking on a link which might be malware, ransomware, a remote access tool or something that could steal or access your data. Nearly 30% of people will click on malicious links, so be more aware and cautious. Before clicking, stop and think. #6 Be aware of what you do over public WiFi
It's better not to use a public WiFi network without VPN. Rather use your cell network (3G/4G/LTE) when security is important. When using public WiFi ask the vendor for the correct name of the WiFi Access point and whether it has security. It is common for hackers to publish their own WiFi SID with similar names.
Disable "auto connect WiFi" or enable "ask to join networks." Hackers will use WiFi access points with common names like "Airport" or "Cafe" so your device will auto connect without your knowledge. Do not elect to remember the WiFi network.
Use the latest web browsers as they have improved security for fake websites. This prevents someone from hosting their own look-alike websites, like Facebook, waiting for you to enter your credentials. Do not click on suspicious links even via social chats, like videos that have your photo, and beware of advertisements that could direct you to compromised websites.
Use a least privileged user or standard user while browsing, as this will significantly reduce the possibility of installing malicious malware. Use a VPN service. Always assume someone is monitoring your data over public WiFi. Do not access your sensitive data like financial information over public WiFi. Do not change your passwords and beware of entering credentials while using public WiFi. If you have a mobile device with a personal hotspot function use this over public WiFi where possible.
Stay safe online with these best practices and avoid becoming the next victim of cybercrime.
&emdash; Joseph Carson is Chief Security Scientist at Thycotic and a Certified Information Systems Security Professional (CISSP).