The 11 companions needed to win the match against computer threats

in #technology6 years ago

Fuente

To cope with computer threats, it is necessary to have an action plan. Eset, a leading company in proactive threat detection, brings the 11 best teammates to face the dangers on the Internet.

"While it is likely that the 2018 Russian Cup has caught the attention of millions of users around the world, it does not hurt to spend a few minutes and take note of some recommendations to be protected while surfing the Internet. From Eset we approach this information because we bet on education and awareness as key protection measures. After all, how safe we ​​are depends to a large extent on how we use technology. ", Camilo Gutierrez, Head of the Research Laboratory at Eset Latin America.

From the Research Laboratory of ESET Latin America present the 11 ideals to win the game against computer threats:

# 1 - The effort made in time can prevent more work in the future

2017 was a historic year because it was marked by two massive cyber-incidents such as the WannaCryptor outbreak and the Equifax attack. Likewise, last year the highest number of reported vulnerabilities was also registered.

When configuring home devices it is important to make sure to enable the automatic installation of updates for each of the programs and the operating system that is used, since it is a good way to stay safe from many attacks. On the other hand, time is also essential when talking about the release of a new patch. In fact, it can trigger a race against the clock, since in a matter of days (or hours), the attackers can reverse engineer the update, identify the vulnerability, and then create an exploit that takes advantage of it.

# 2 - Cut out the equipment

Putting on the "playing field" a program that is no longer needed, that is almost never used or that was supplanted by a "younger" one can become a risk simply by increasing the chances of being hit by an attack. That is why, to minimize possible entry points for cybercriminals, it is advisable to even disable unnecessary and unused services and ports, as well as to get rid of programs that have a long history of vulnerabilities.

To strengthen the browser, it is recommended to use an advertising blocker and remove all add-ons and plugins that are unnecessary. Many web-based attacks take advantage of these features to implement malicious code. So while you are browsing the web, the ideal would be to close the accounts where you are no longer working and use the accounts with elevated privileges or administration only for administrative tasks.

# 3 - Practice the use of strong passwords

One of the easiest ways to protect online privacy is to use long, strong and unique passwords, or better yet, phrases like password for each of your accounts; This can be very useful in case the access credentials to an account are filtered as a result of a leak from the service provider. Also, just as you never share a team's strategy with an opponent, you should never share your password with anyone.

# 4 - Observe before jumping

As much as complex passwords are used, it is important to be smart when choosing where to store them. On the Internet, everything is just a click away and the scammers are experts in how to take advantage of that. In their search to obtain personal information from users they use social engineering strategies to make them fall into the trap and the user clicks on a link or opens a malicious code that comes in an attachment. One of the most used resources used by cybercrime, due to its effectiveness, are phishing attacks, where the victim is redirected to a website where the real threat is.

# 5 - Add a factor

The use of double authentication factor is advised; especially for accounts that contain personal information or other important data. It is simply a matter of adding one more step to confirm the identity when trying to log in or take some action. In this way, even if you get to filter a password, who tries to access a personal account will face the barrier of entering a password.

# 6 - Use secure connections

When connecting to the Internet, an attacker can get between a device and the connection point. In order to reduce the risk of a man-in-the-middle attack intercepting private data while on the move, it is advisable to use only web connections secured by HTTPS and trusted networks, such as the connection of a home or mobile data when carrying out more delicate online transactions, such as accessing a banking platform through the smartphone. To strengthen Wi-Fi connections and make them more secure, they must be supported by at least WPA2 encryption (although ideally WPA3), even in a house; In addition to using a strong administrator password (not default) and update the router's firmware.

#7 - Hiding behind a firewall

The firewall is a key player, it is considered as the first line of face to face Internet defense. Generally, it is usually presented as a program on the computer, although it is also possible to find it by integrating an antivirus solution or it can be integrated into the router. It is responsible for allowing or denying active Internet traffic to an internal network or computer.

#8 - Back up

Generally, a system is never completely safe from being hit. And beyond what can cause a computer incident, the data can also be compromised by something such as a failure in the storage system used. It may take some time to get into the habit of backing up, but in the face of a problem that affects the information, this player can save the game.

#9 - Choose a security solution

Even using all common sense and taking all possible precautions, it is necessary to have another player on the team since the attackers are becoming more and more skilled. We are talking about a security solution for your devices. Without a doubt, it is one of the simplest and most effective ways to be protected in the digital world. A reliable antivirus solution uses several detection techniques and implements multiple layers of defense that are activated in the different stages of the attack process.

#10 - Smartphones are also computers

It is important that users stop viewing security solutions for the exclusive use of laptops or desktop computers. The phones have evolved to such an extent that they became powerful handheld computers. The cybercriminals know this perfectly and for quite some time now they have carried out attacks aimed exclusively at mobile users.

In addition, use a secure authentication method to unlock the device's screen; back up the device, download system and application updates as soon as they are available (preferably automatically), install only trusted applications and only official stores, and activate encryption on your device, if not it is activated by default.

# 11 - Be careful

The last member of the team is the user; the Guardian. It is important to stay alert and educate yourself regarding computer security. We are all possible targets of attack and we can become victims. Just enough to click where it should not be to infect and damage a device, and perhaps also others.

Sort:  

Congratulations! This post has been upvoted from the communal account, @minnowsupport, by sandovaha from the Minnow Support Project. It's a witness project run by aggroed, ausbitbank, teamsteem, someguy123, neoxian, followbtcnews, and netuoso. The goal is to help Steemit grow by supporting Minnows. Please find us at the Peace, Abundance, and Liberty Network (PALnet) Discord Channel. It's a completely public and open space to all members of the Steemit community who voluntarily choose to be there.

If you would like to delegate to the Minnow Support Project you can do so by clicking on the following links: 50SP, 100SP, 250SP, 500SP, 1000SP, 5000SP.
Be sure to leave at least 50SP undelegated on your account.

Hello, as a member of @steemdunk you have received a free courtesy boost! Steemdunk is an automated curation platform that is easy to use and built for the community. Join us at https://steemdunk.xyz

Upvote this comment to support the bot and increase your future rewards!