Protect Yourself from Cyber Attacks

Edited by Shelley, Eng, Melissa Rae

Just because the month of October is National Cyber Security Awareness Month, doesn't mean that the importance of cyber security stands valid and important only for the month of October. "Cyber attacking" was born along with the invention of the internet. It has, since then, only been evolving at an aggressive rate. A compilation made by Tested.com showed that even big technology companies and organizations succumbed to cyber frauds at one point or another.

Was this helpful? Yes | No| I need help

Preetam Kaushik Einsen und Nullen - Symbolbild.jpg

On one side, there are governments preparing cyber agenda against enemy nations. Like the Stuxnet, a malicious malware worm designed by the U.S. and Israel government agencies to infect uranium enrichment facilities in Iran. On the other, we have agencies like WikiLeaks that constantly target government organizations in a quest for bringing out the truth.

Was this helpful? Yes | No| I need help

Recently, at the House Intelligence Committee in Washington, the directors of the FBI, CIA, NSA and other intelligence agencies expressed their concerns and discussed the cyber challenges faced by the United States and the international communities.

Was this helpful? Yes | No| I need help

James Clapper, the Director of National Intelligence said, "Cyber threats to U.S. national and economic security are increasing in frequency, scale, sophistication and severity of impact. We foresee an ongoing series of low-to-moderate level cyber-attacks from a variety of sources over time, which will impose cumulative costs on U.S. economic competitiveness and national security".

Was this helpful? Yes | No| I need help

As we can see, when the time comes, we may not be spared. How do we make sufficient arrangements to ensure that our cargoes of data are at a safe shore when the cyber pirates plot to attack?

Know Your Personal Data

How much do you know about your personal data and its security? Let's look at some of the fundamentals.

  1. 1
    What are you scared of losing
    ?
    For organizations, it is their commercial data. For individuals, it is the candid and fragile information of their personal lives. For an architect, it is the blueprint. For an advertising agency, it is the idea. Everybody has something to lose in the online world, should bad cyber prophecies come true.
    Was this step helpful? Yes | No| I need help
  2. 2
    Where do you store
    ?
    Typewriters can't be attacked. They might be slow, stringent, and unifaceted, but they serve their purpose. It all depends on where we store our most important things. The advanced world endorses cloud technology. But how much do you know about the cloud? Clouds don't have walls. Have you ever thought about that? Merely because something is convenient, doesn't necessarily mean it is safe.
    Was this step helpful? Yes | No| I need help
  3. 3
    What use is your information to somebody else
    ?
    If we find a wallet on the street, what is our first emotion? Those who thought about finding the rightful owner, please raise your hand. Those who thought, "screw it... I have no money... this is a Godsend" raise your hand. There is always a value to everything. Even garbage has value to someone. That brings us back to our original question, with much more signified relevance - what is your information worth to another scheming individual or organization? Priceless.
    Was this step helpful? Yes | No| I need help
  4. 4
    There is no such thing as being "the smartest"
    .
    There is always someone smarter. So if we are under the impression that we have all the right cards in the right slots, then someone out there is about to shake your world. Like literally. "Ocean's Thirteen" coming to mind?
    Preetam Kaushik Do Not Track.png
    Was this step helpful? Yes | No| I need help

Be Aware of Interoperability and Data Portability

We are much too reliant on technology these days.

  1. 1
    Limitless networking of smart devices
    .
    With the internet connecting almost every gadget and piece of technology we own, most of them are interconnected and networked internally without our knowledge. This is quite fascinating, and at the same time, devastating. This means that something you have saved on your iPhone can be accessed by your brother's Android watch, which in turn can be accessed by your brother's girlfriend's Windows desktop.
    Was this step helpful? Yes | No| I need help
  2. 2
    Trust is inevitable
    .
    Back in the day, we stuffed our wallets full of cash and cards. Whatever happened to that? Not only are email service providers enabling you to maintain business and personal transactions through email, they also offer wallet services. We can even pay for products and services with our smartphones. Slowly but steadily, we are eliminating the concept of physical money.
    Was this step helpful? Yes | No| I need help
  3. 3
    Guarding our assets
    .
    We are entering a time where we're willing to dump all of our precious valuables into something "safe" that we can't really see or touch. We are convinced that the encrypted protection compounds are going to guard our assets against calamities. The fact that we have been unnervingly captivated by the reliability of virtual banks and their security protocols truncates the inspiration to worry about the adverse effects of virtual banking.
    Was this step helpful? Yes | No| I need help
  4. 4
    Maintaining data online and offline
    .
    Many online resources and applications are now providing the ability to maintain and contain data online and offline. This is to show portability and uncanny robustness.
    Preetam Kaushik 256px-Artificial.intelligence.jpg
    Was this step helpful? Yes | No| I need help

Don't Take Your Online Privacy for Granted

What is done can't be undone.

  1. 1
    Online recluse
    .
    Just as it is difficult to be socially reclusive in today's world, it is highly impractical to remain immune to the changes and impacts brought around by the digital world. There is always one reason or another to be online. However, don't make "digital" a life partner. Having a non-committed relationship with the online universe is recommended.
    Was this step helpful? Yes | No| I need help
  • 2
    The disadvantage of being important
    .
    The more important something is, the more vulnerable it is to being attacked in the cyber world. If you are an important person in an important field, there is no doubt that your work will be prone to attacks. Consult with a security expert and have your work encrypted to at least two tiers. This type of encryption involves a password as well as a login authentication in the form of coded texts and SMSes.
    Was this step helpful? Yes | No| I need help
  • 3
    In case of emergency
    .
    When people get victimized in the cyber-attack, the first thing they worry about is their data. Some attackers disable us from accessing our own files. The others destroy the files entirely. Where is the back-up? It is taxing to keep the same files in two different places at all times, but we have got to do what we have got to do.
    Was this step helpful? Yes | No| I need help
  • 4
    Going after porn
    .
    Porn sites have always remained a productive haven for cyber criminals to target their victims. Try to stay away from porn sites.
    Preetam Kaushik Le Coucher de la Marie.png
    Was this step helpful? Yes | No| I need help
  • Avoid the Risk of Getting Your Data Stolen

    The risk of getting your data stolen is very high because everything that connects to internet can be accessed.

    1. 1
      Insecure Public WiFi
      .
      Cafés, metros, airports, malls... these are the kinds of places where we tend to use public WiFi. Though not every public WiFi set up is bad and dangerous, not every public WiFi is safe either. Use tools like Virtual Private Networks (VPN) on WiFi networks and access your private information. Dr Malcolm Pattinson, an information security expert for University of Adelaide labeled WiFi as "the most insecure mechanism" when it comes to sharing extremely sensitive information. He said, "It's so easy to tap into and they can track keystrokes. They get your credit card number and your password".
      Was this step helpful? Yes | No| I need help
    2. 2
      Suspicious emails
      .
      Attacking through emails is very easy and effective for the cyber fraudsters. They engage in schemes like "corporate account takeover" and "business email fraud" and trick businesses into transferring large sums of money into fraudulent bank accounts. Between October 2013 and June 2015, companies across the world have lost more than $1 billion in such email scam attacks. They make it seem like the sender is someone you know. The truth is, it is someone sitting in a remote hilltop in a South American village. If the email is confidential, if it involves exchange of money, or it contains any banking information, please check the source of the mail. First check the IP address of the email. Then use Google to cross-check the IP address of the sender.
      Was this step helpful? Yes | No| I need help
    3. 3
      Clouded by the cloud
      .
      Users are mushrooming the cloud. The cloud is good, but it has to be used under certain guidance. The infamous iCloud cyber attack of 500 celebrities in 2014 took us by surprise. Experts are under the impression that storing sensitive information on cloud will soon be the only way to store and share files. But, that has a catch. We need to understand very finely and read between its lines, how it really works, else it will be a "Sex Tape" movie sequel. Satnam Narang, a security response manager at Symantec says, "Convenience trumps security very often when it comes to various services".
      Was this step helpful? Yes | No| I need help
    4. 4
      Stolen Passwords
      :
      Last year, the most common password was "12345". Just as how our house is only as secure as the lock we use, our online data is only as protected as its password is. Set a strong and advanced password for yourself. It's also good to change your passwords at frequent intervals, AND never use same password for multiple accounts. In the Ashley Madison cyber-attack, the attackers who go by the name "CynoSure Prime" decoded 11 million passwords of the 36 million accounts registered on the infidelity website. CynoSure Prime took advantage of the flaws instilled in the developers' algorithm by using a password obfuscation process known as hashing. There are some very interesting ways to procure passwords:
       
      1. Keyloggers Keylogger takes citizenship in our system and becomes a "task" that starts running from the bootup. Keylogger registers all keystrokes as we type and eventually sends them to the attacker. Keyloggers are so adaptable and legitimate-looking that they actually show up in "processes" under Windows task manager.
      2. RAT (Remote Administration Tool): With this, the attacker is able to connect to our systems from any remote location. He sees the exact same screen what we see on our computer. Also with the help of his built-in keylogger he is able to copy all files from the hard drives of our computer.
      3. Trojan: One of the more comprehensive forms of malware. It infects and enables the attackers to gain administrative control of a computer through keygens and codes equipped in free software available online.
      Was this step helpful? Yes | No| I need help

    Protect Your Personal Data Against Cyber Attacks

    For first-class protection against cyber attacks, follow these tips:

    • For banking and other highly confidential information, whenever possible, use an online/virtual keyboard.
    • Never store passwords for devices and accounts on any digital device. Try as much as possible to memorize it.
    • Install the best antivirus and malware protection software on all devices.
    • Never download executable files from untrusted sources and websites.
    • Don't download attachments unless really necessary. If you have to, please use a removable device as the default destination for attachment downloads.
    • Some websites automatically provide the secure HTTP. Otherwise, please activate secure browsing from your browser settings.
    • Despite all the precautions and measures, should something bad happen, have your backup software ready. This will make sure that you always have a backup of all your files.

    If you have problems with any of the steps in this article, please ask a question for more help, or post in the comments section below.

    Comments

    VisiHow welcomes all comments. If you do not want to be anonymous, register or log in. It is free.

    Article Info

    Categories : Browser

    Recent edits by: Eng, Shelley

    Share this Article:

    Thanks to all authors for creating a page that has been read 329 times.

    x

    Thank Our Volunteer Authors.

    Would you like to give back to the community by fixing a spelling mistake? Yes | No