No need to be paranoid.
No need to be paranoid.
When online accessing a banking site or any other application containing sensitive data, make sure you log out of the site and THEN close your browser. If you simply close your browser, some of the session information that a hacker can use to gain entry is still running in the background.
Here’s a tip that just might save your bacon: Set up withdrawal alerts on your bank accounts. Many banks will send you an e-mail alert whenever money is withdrawn from your account via check, debit card or transfer. Setting up those alerts will allow you to spot and report fraudulent activity BEFORE the money has already been siphoned into a cybercriminal’s hands.
Like it or not, device manufacturers LOVE to stuff your brand-new PC, tablet or phone full of “free” applications (they get paid to do it, so you’ve got a slim chance of getting one without a side of spamware). But clutter is the enemy of a speedy PC, and outdated apps are a breeding ground for hackers; so if you’re not using a particular software on a regular basis, it’s best to REMOVE it completely.
There are thousands of hackers who get up every morning with ONE goal in mind: to find a new vulnerability in a commonly installed software (like Adobe, Flash, or QuickTime) to access your computer. That’s why these companies frequently issue patches and updates for KNOWN security bugs; and once a KNOWN vulnerability is announced via a patch, hackers get to work like crazy trying to figure out how to use the vulnerability and access those users who are lazy about installing updates.
These last 2 weeks we have seen what amounts to be a new PHISHING technique targeting small businesses and their firewalls. The email looks to be from a valid vendor that you may or may not have employed in the past. It requests information about your firewall IP address, or asks you to create a hole in your firewall (a "whitelist").
If you give this access, you're opening yourself up to a wide attack.
Most of your employees have wireless networks set up in their homes. Unlike your business wi-fi, many home users are lax about creating secure wireless networks – leaving a backdoor open to hackers. Wi-fi signals often broadcast far beyond your employees’ homes and out into the streets.
When employees work from home, they need access to important company files. It’s easy to look at consumer-grade, cloud file sharing solutions like Dropbox, OneDrive, and Google Drive. But listen up!
These applications pose a huge threat to your company because company data can be spread far and wide without central oversight of what information is being shared with whom.
Here's a sneaky trick used by many hackers: they purchase and set up a fraudulent website that is a close misspelling of a legitimate one. Example: www.faceboook.com (extra "o") or www.dropbox.net (instead of .com). All you have to do is accidentally fat-finger ONE letter in the URL and up pops a very legitimate-looking fake copy of the site you were trying to get to - and the login and links are full of keylogger malware and virus landmines waiting for you to click on them.
A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular website or to click and download a virus.