Monday, 11 April 2016

Cyber threats- What are they and how can they be avoided




With the rise of mobile phones and our mobile dependability on our everyday lives, it's getting increasingly necessary  that we are well informed of global cyber threats.

Some of the world leading threats are as follows:

1) Identity Theft: With one identity fraud occurring every two (2) seconds as reported by CNN Money, and ranking first place for 15 years in a row as the top consumer complaint, it is imperative that  it is treated with utmost importance. one of the fastest growing online crimes in the world today. Your identity is at risk everyday through the availability of our everyday online materials which includes: social media information, financial data, resume, e- commerce, online audio and video streaming and the list goes on and on. But there is still plenty to do to keep your identity safe.

Some of the ways customer's identity are stolen are through the means of: 
a) Unsecure websites: During online transactions, hackers are able to intercept payment details. Online users should make sure they make online transactions from  secure websites and protect their information when they are online.

b) Hacking: It is important to keep our personal laptops out of public reach. Tech Savvy IT experts hack into personal computers to steal Card information and bank details.

c) Shoulder Peering: when typing ATM Pin or your card details on your smartphone, there is always a chance someone is looking over your shoulder to steal your personal information.  You can stop shoulder surfers by covering your screen with your hands when entering your personal data in public.

Others include: phishing, skimming, pretexting, etc.

2) Mobile and Smartphone Vulnerability attack: these vulnerabilities sometimes come from the apps you install. Mobile phones are also vulnerable to malware, spyware which can log keystrokes and capture screenshots. One way to avoid this kind of attack is being careful with the type of apps you install and from what source they are derived, being careful of the kind of emails you open in your mobile phone, picture uploads, spam emaild etc.

3) Phishing: This usually occurs when cyber hanckers trick people inti revealing sensitive information about their passwords , card details an d personal records. One of the most popular phishing methods is sending online users emails from that seems like it emanated from their financial institution or givernmenr. Here Customers, are asked to type in their card details, financial records etc. Phishers want to lure victims to fraudulent Websites, created to steal personal information, such as names, credit card and bank account numbers, social security numbers, and financial account logins and passwords. Bait can be delivered via SMS or phone, but usually arrives via e-mail, from mass-mailed spam.

In a world of ever-evolving cyberthreats, what can you do to protect yourself? Security awareness is the first line of defense. There are powerful security tools available to help, but remember that you also need to use common sense to protect computer, your information and yourself.


For more on website protection tools, visit www.lenaxltd.com


No comments:

Post a Comment