It is a rare thing to see anyone without a smartphone, computer or some other internet connected device. It goes without question that ensuring your own safety while using the internet is of utmost importance. Cyber attacks can be devastating and happen throughout all corners of the internet.
Think about it: if large corporations have been known to fall victim to malicious activities then you most certainly can too. From email phishing scams to accidentally downloading vicious, information stealing malware, anyone can fall victim.
Social media seems to be a major target these days. Tricking people by using an already compromised Facebook account and initiating the “Trusted Contact” feature is the latest craze although it’s mainly impacted those connected with defending human rights or similar figures. This is no way means you can’t be targeted as well.
The best way to defend against the “Trusted Contact” Facebook scam is to contact the friend directly. Not by email or text, make sure it is in person or at least over the phone. Other scams and malware infections come from several sources including email, malvertising ads on websites, targeted system hacking and direct downloading of so-called trusted files.
Defending against email attacks is probably the most simple of all: don’t open emails or click links within an email if sent from an unknown user. Also, don’t comply with any instructions from an unknown sender, no matter the promised prize.
Be sure to avoid downloading anything you aren’t entirely sure is legitimate and safe. Hackers are smart and they find ways to trick you but going with your gut can help in a big way.
Keeping your phone and computers safe from hackers is a bit more complicated but the first line of defense will always depend on the security software you have installed. If you don’t have any software: get some now! Stay safe and browse away folks.
Latest posts by Unallocated Author (see all)
- Major Trends in Cyber Security to Expect in 2020 - December 12, 2019
- 5 Robust Cybersecurity Practices for Your Email Marketing Campaigns - December 5, 2019
- 5 Insider Threat Solutions You Should Follow in 2019 - November 29, 2019