11 cybersecurity tips to stay safe online

12
11 Tips to protect yourself from being HACKED

Upload: scott-schober

Post on 15-Apr-2017

128 views

Category:

Small Business & Entrepreneurship


1 download

TRANSCRIPT

11 Tipsto protect yourself from being HACKED

Cybersecurity attacks arevery real.In an instant, they can wipe out your company’sfinances and your personal finances, sometimesbeyond repair. It’s critical to know everything youcan to protect yourself.

Did you know that 95 percent of cyber attacksoccur due to human error? I’ll tell you why thisis great news.

Only five percent of all cyber attacks are out ofyour control. Today, I’m going to give you 11 FREEtips from my new book Hacked Again. I want tomake sure you protect yourself and your lovedones from these vicious modern threats.

My book delves much deeper into my personal experiences about how I was hacked, not once,but twice!! I will also show how you can protectyourself from cybersecurity threats. If you want to read more and learn even more aboutprotecting yourself and your business, please purchase, Hacked Again.

Hello, I’m Scott Schober,renowned cybersecurity expert,

author and inventor.

Passwords – Lockpicking Your Brain

According to the “2013 Data Breach InvestigationsReport” (DBIR) done yearly by Verizon’s risk team,approximately 76% of attacks on corporate networksinvolved weak passwords. This further underscoresthe importance of strong passwords.

Passwords are like memory keys that only you know,but they can be stolen by anyone in the world look-ing in the right places for the right clues.

Be careful whom you share your Wi-Fi passwordwith. If you have shared your password with anyone,change your password to a stronger one immediatelyafter they leave.

1

Malware - ransomware isa new growing threat

Remember when it was obvious that you were beingscammed online? The email lacked basic Englishgrammar or included an overtly fake link. Today’shackers are much more sophisticated. It’s importantto question emails, links and other forms of onlinecontent that you see. Unless you are 100 percentcertain it’s not an attack on your computer or youremail, don’t click it.

Today’s malware also includes ransomware, which isa type of hack that locks your computer or accessuntil you pay some sort of ransom. Be very cautiousof these attacks. It’s critical to backup your filesfrequently in the case of such an attack. Never everpay ransom to a cyberhacker.

1) Never click on any attachment or link in an e-mail sent to you, no matter how legitimate it might look.

2) DON’T pay ransom to a cyberhacker. 3) Make frequent backups in case you are ever

a victim of ransomware.

2Chapter 7 of Hacked Again I share howto protect yourself from ransomware

Identity Theft

Social media is beneficial, but think before you putout personal information on any social media site,or you might end up being a victim of identitytheft.When it comes to identity theft, criminals arescouring social media channels for informationabout targeted victims. It’s important not to give uptoo much information on your own social channels.It’s even more important not to post every detail inyour personal life. While checking in on Facebookcan be fun, it can also be fun for a criminal whonow knows when you aren’t home.

3Any pieces of personal information a hacker cangather about you, is another step toward stealing orselling your identity. Don’t list key information likeyour date of birth or where you work. It makes youan easy target.

Social media is beneficial, but think before you putout personal information on any social media site,or you might end up being a victim of identity theft.

Spam

The most important thing to remember aboutthieves who try to spam you is that they firsthave to confirm they have reached a real emailaddress. The best solution is to not respond.Send to your junk or delete folder.

Do not click on the bottom of a spam e-mailand ask to be removed from the “Do Not E-mail” list. You will likely receive more spambecause they now know you are a real personand will then sell your name for more moneyto other spammers.

4

Phishing

Phishing attacks are one of the most popular and effectiveways to lure one to click on an attachment in an e-mailyou receive. Fight the urge and DON’T click.

You think that people don’t fall for phishing scams? Think again.

Phishing Attacks Statistics (www.getcybersafe.gc.ca): Who takes the bait?

• 156 Million phishing e-mails are sent every day by cyber criminals globally.

• 16 million e-mails make it through the SPAM filters.• 8 million people open the e-mails.• 80,000 people (or 10%) fall for a scam every day and share their personal information.

5

More on Passwords

but they are very necessary intoday’s digital world. It’s critical tohave a password that is not easy touncover. Don’t make passwords toopersonal or use personal informationin any of your passwords. Make surethat you don’t use the same pass-

word for multiple accounts.

Passwords long, strong, and complexare secure. Use an automatic

password generator and a passwordstrength meter to verify how secure

a password truly is.

6 Protect yourself

Companies should invest in independent vulnerability andpenetration assessments.

Do not try to save money byusing your own IT department.

7YES.

Passwords are a nuisance,

Wireless Threats

The wireless threat is often themost attractive means a cyberthiefwill exploit first to gain access to acomputer network.

8

Insider Threat

It only takes one corrupt employee within an organizationfor a successful cyber crime. Report all suspicious activityto your employer as you never know when you have an insider threat.

9

Chapter 15 of Hacked Again learn how toset up a secure WiFi network.

Make sure you check your credit card statements regularly

Due to new technologies like scanners and other devices that can quickly and discretely capture yourcredit card data, these types of breaches are very common today. Protect your credit cards with securitysleeves. Request credit cards that only use smartchiptechnology, as these cards are much more difficult tocompromise.

Regularly check your statements to ensure your trans-actions are valid. Contact your bank immediately ifyou notice something suspicious.

If you accept credit cards, be extremely cautious ifyour customer wants multiple items shipped in themost expedited manner, especially if internationally.STOP and ask them questions, such as issuing bank,or for a photo ID to verify their credentials.

10

Social Media Scanning

Be aware that hackers will scan your profiles. It’s important tocheck your LinkedIn and Twitter accounts regularly as these areusually the most publicly accessible channels for hackers tofind information about you.

Never use your actual birthday when setting up an account!

11

Keep Informed

Scott Schober offers valuable information in his bookHacked Again. You can also find valuable tips and information on cybersecurity and related topics bysubscribing to his podcast: “2-Minute Cyber Briefing.”

Scott is called upon by the majorTV networks as a cybersecurity expert. On his website you canview all of his appearances, alongwith his archived Podcasts.

Due to personal experience, Scottknows this topic and feels it is NOTto be taken lightly!