Consider Yourself a Target for Hackers
“Held every October, National Cybersecurity Awareness Month (NCSAM) is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity and to ensure that all Americans have the resources they need to be safer and more secure online,” according to Homeland Security.
“NCSAM 2019 will emphasize personal accountability and stress the importance of taking proactive steps to enhance cybersecurity at home and in the workplace. This year’s overarching message – Own IT. Secure IT. Protect IT. – will focus on key areas including citizen privacy, consumer devices, and ecommerce security.” Learn more about National Cybersecurity Awareness Month here on the Homeland Security website.
Every weekday in October, we’ll help spread Cybersecurity awareness by sharing an important online safety tip.
Tip #1: Consider Yourself a Target for Hackers
If you own a computer, cell phone, tablet, etc., you are a target for hackers. If you access sensitive data online, you are a target for hackers.
Don’t think being hacked can’t happen to you.
The scary thing about it is, if you’re vulnerable to hackers, you could potentially be putting your friends, family, even your company at risk as well.
Let’s start with Cybersecurity – what is it anyway?
Cybersecurity secures the connection of physical units (for example, equipment and control units) to external, virtual space like the internet. This includes data generation, transmission, storage, and analysis on physical and non-physical interfaces.
How are you putting yourself at risk?
- Your password is obvious and you use the same password for multiple accounts
- You use free, unsecured public WiFi
- You open unsafe attachments
- You click a link before checking the URL
- You entered private data on an unsecured website
How are your credentials compromised?
- Phishing: emails sent disguised as legitimate messages in order to trick users into disclosing credentials
- Malvertising: malware is injected into legitimate online advertising networks to capture visitor’s credentials
- Watering Holes: malware is injected into the code of popular websites in order to capture visitor’s credentials
- Web Attacks: internet-facing companies are scanned for vulnerabilities in order to exploit the company and establish a foothold
What can a hacker do with compromised credentials?
- Send spam from compromised email accounts
- Deface web properties and host malicious content
- Install malware on compromised systems
- Compromise other accounts using the same credentials
- Exfiltrate sensitive data (data breach)
- Identity Theft
The best protection software won’t help someone who isn’t safe online. Protect your privacy and data by educating yourself on online security.
Prevent a potential cyber attack by making sure you are doing everything in your power to protect your data by following the basic cybersecurity procedures that we’ll touch on through out the month of October.
Cybersecurity Tip #2: Understand the Most Common Cybersecurity Risks and How to Avoid Them
4332 Wheeler Road, Suite 105, Martinez, GA 30907