Cybersecurity 101: Best Practices To Protect Your Personal Data

March 9, 2022
By

< Back to resource center
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
< Back to Resource Center
Share this Article:

Cyber World and What Do We Know

A few Facts from Webroot, a leader in cloud-based security intelligence solutions:

2019 Threat Reports:

  • 93% of all cyberattacks start with phishing
  • 93% of phishing emails drop ransomware
  • 95% of cyber attacks result from human error
  • Devices that use Windows 10 are at least twice as secure as those running Windows 7.

Types of Cyber Attacks

  • Man-in-the-middle according to Norton: man-in-the-middle attack requires three players. There’s the victim, the entity with which the victim is trying to communicate, and the “man in the middle,” who’s intercepting the victim’s communications. Critical to the scenario is that the victim isn’t aware of the man in the middle.
  • Phishing as said by Webroot is a type of online scam where criminals send an email that appears to be from a legitimate company and asks you to provide sensitive information.
  • Password Attacks (aka Dictionary Attack) is an attack that takes advantage of the fact people tend to use common words and short passwords. The hacker uses a list of common words, the dictionary, and tries them, often with numbers before and/or after the words, against accounts in a company for each username, explained by onelogin.
  • Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network (by contrast, software that causes unintentional harm due to some deficiency is typically described as a software bug). A few known malware are Trojans, Worms, File Infectors, Logic Bombe, Ransomware, Adware, and Spyware.

Practical Tips To Protect Your Personal Data

  • Use Stronger Passwords or Password Manager Apps
  • Keep Your Software Up To Date
  • Access Online Accounts From A Trusted Computer
  • Enable Two-Factor / Multi-Factor Authentication
  • Back-Up Your Data
  • Phishing and Spear Phishing Attack
  • Critical Thinking — Stop for a minute and analyze the email.
  • Hovering Over The Links — Move your mouse over the link. Apply critical thinking to decipher the URL.
  • Analyzing Email Headers — Email headers define how an email got to your address. The “Reply-to” and “Return-Path” parameters should lead to the same domain as is stated in the email.

Read more on our IT Security and Compliance page or let's talk we'd like to answer your questions.

You can also read this article here.

< Back to Resource Center
Share this Article:

Cyber World and What Do We Know

A few Facts from Webroot, a leader in cloud-based security intelligence solutions:

2019 Threat Reports:

  • 93% of all cyberattacks start with phishing
  • 93% of phishing emails drop ransomware
  • 95% of cyber attacks result from human error
  • Devices that use Windows 10 are at least twice as secure as those running Windows 7.

Types of Cyber Attacks

  • Man-in-the-middle according to Norton: man-in-the-middle attack requires three players. There’s the victim, the entity with which the victim is trying to communicate, and the “man in the middle,” who’s intercepting the victim’s communications. Critical to the scenario is that the victim isn’t aware of the man in the middle.
  • Phishing as said by Webroot is a type of online scam where criminals send an email that appears to be from a legitimate company and asks you to provide sensitive information.
  • Password Attacks (aka Dictionary Attack) is an attack that takes advantage of the fact people tend to use common words and short passwords. The hacker uses a list of common words, the dictionary, and tries them, often with numbers before and/or after the words, against accounts in a company for each username, explained by onelogin.
  • Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network (by contrast, software that causes unintentional harm due to some deficiency is typically described as a software bug). A few known malware are Trojans, Worms, File Infectors, Logic Bombe, Ransomware, Adware, and Spyware.

Practical Tips To Protect Your Personal Data

  • Use Stronger Passwords or Password Manager Apps
  • Keep Your Software Up To Date
  • Access Online Accounts From A Trusted Computer
  • Enable Two-Factor / Multi-Factor Authentication
  • Back-Up Your Data
  • Phishing and Spear Phishing Attack
  • Critical Thinking — Stop for a minute and analyze the email.
  • Hovering Over The Links — Move your mouse over the link. Apply critical thinking to decipher the URL.
  • Analyzing Email Headers — Email headers define how an email got to your address. The “Reply-to” and “Return-Path” parameters should lead to the same domain as is stated in the email.

Read more on our IT Security and Compliance page or let's talk we'd like to answer your questions.

You can also read this article here.

IT is complex. We make it simple.

Learn how we can build a complete and robust solution for your unique IT needs.

REQUEST YOUR FREE QUOTELET'S TALK
© 2024 Alternis Inc.
Privacy    |    Terms    |    Cookie    |    Legal