Saturday, November 23, 2024
33.0°F

It's about protecting from scareware, ransomware, spyware

by Valerie Day
| April 15, 2014 3:18 PM

With a startling number of online scams appearing daily and with the detection and prevention of fraudulent activity becoming more complicated, maintaining a secure computer system and practicing safe online habits has never been more important.

Safeguarding yourself online can be challenging, at best, especially for those who possess only basic technology-related skills and have limited knowledge of Internet concepts. By following a few simple security measures you will not only protect yourself, your data, and your identity, but also ensure trouble-free computing.

• Keep your operating system and installed programs updated. First and foremost, be vigilant about installing security updates when they become available for your operating system.

By ignoring this simple preventative measure, you will inevitably leave your computer at a higher risk for online threats via unaddressed security holes and vulnerabilities.  

Additionally, further neglecting fixes for newly discovered bugs in your operating system could eventually hinder your PCs performance.

Secondly, make certain that you download and install newly issued security updates for your applications and programs as they become available.

Further protect yourself from online threats by applying all newly released patches to commonly targeted programs that are peppered with security holes such as Oracle’s Java or Adobe software. Not only do the product updates secure your system from critical security flaws, they also allow for you to take advantage of the latest features and improvements available for your devices.

• Very simply put, install and keep your anti-malware and Internet security software current. Having the latest security software and checking for updates on a weekly basis (if not more) is your best defense in the prevention of infections and malicious attacks that are specifically designed to wreak havoc on your PC or steal your personal and financial information.

• The increased popularity of online shopping has unfortunately unleashed a surge in credit-card fraud schemes and identity theft. However, by keeping the following tips in mind, you can shop online with confidence. To begin with, shop at trusted sites rather than being led astray by search engine results.

By utilizing major online retailers, such as Amazon.com, you can be sure that your personal and financial information will be safeguarded by every means possible. However, if you should make the decision to purchase goods from a non-traditional website, before entering in any personal information, determine whether the site you are using is security enabled.  To verify that the site is using encryption, the web address will begin with “https://” and not just the typical “http://”. Additionally, look for the “locked padlock” icon indicating verification of the website’s security standards.  

Depending on your browser, the security symbol will appear in the bottom right hand corner of your computer screen in the status bar or more commonly, it will be located in the address bar to the far right of the web address.

• Whether you are creating an account to shop online or to establish identity at a preferred website, make the habit of creating a strong, unique password for every situation. By all means, never, ever use the same password to login to multiple sites.  

Furthermore, do not use easy-to-guess passwords such as “password,” “123456,” or any part of your name, birth date or physical address. This information is too readily available online and can often offer enough clues to easily guess poorly created passwords.

To be on the safe side, make your passwords long and strong by combining lower and uppercase letters with numbers and symbols.  Keeping in mind that the length is the most influential factor in determining a strong password and creating a sentence or passphrase will most certainly help protect your account from unauthorized access.  

For instance, using a phrase that is meaningful to you such as “Mama drives a Chrysler 300C,” you can then generate a secure, easy-to-remember password of “MaMadrives@300C”.

• Even though you have the necessary tools to take a proactive approach to ensure maximum online safety, combating fraud entirely is virtually unattainable unless you are fully aware of all types of scams in circulation and are able to recognize the warning signs. Although the world of cyber scams is in a constant state of evolution, one fraud tactic worth addressing is phishing, as it is becoming one of the fastest growing online crimes.  

Typically, a phishing solicitation will come in the form of a fraudulent email message from what appears to be sent by a trusted source such as your bank, credit card company, or other financial institution. The legitimate looking email prompts for an urgent, immediate response “phishing” for your private data such as account user names and passwords, pin numbers, credit card numbers, bank account numbers, and other financial information.

The stern warning is usually accompanied by severe consequences such as the suspension or deletion of your personal account. How can you tell the difference?

Unfortunately, as phishing scams become more prevalent, there is no surefire way to distinguish a potentially lethal attack from a legitimate email or website. However, there are a myriad of online resources designed to help you identify the warning signs of phishing scams and the preventive measures you can take to stay safe online.

One such very valuable and time-worthy resource is the federal government’s website, OnGuardOnline.gov. The content presented at www.onguardonline.gov provides the essentials to help you and your family experience a safe and secure online environment.

In closing, the old adage, “go with your gut,” certainly holds true when it comes to your online safety and security. Stay on guard, trust your instincts and remember, if a situation does not seem right, it probably isn’t.

(Valerie Day has an associates degree in computer science and business applications.)