Online Threat Alerts (OTA)
An anti-cybercrime community alerting the public.

What Should Everyone Know? – Basics Of Cybersecurity

The issue of cybersecurity is acute today for each of us. After all, the Internet is now not only about correspondence and personal data there, it's about accounts, bank cards, personal addresses and documents that we store in our gadgets. How to prepare yourself and protect your data? The issue is relevant not only for personal use, but also for making business in the modern world. Let's find out together!

Bank cards

Leakage of bank card data is a fairly common problem. Unfortunately, there are too many people in the modern world who are ready to make money at someone else's expense, and it's easier to do this via the Internet than live. The most common means of theft used by cybercriminals are Trojan viruses: getting into a personal computer or an Android phone, they gain access to online banking. You can "infect" the device, for example, by phishing, by receiving an email or in the form of an SMS with a file, a link from an "allegedly" bank, government agencies, contractors, friends. The main danger of this virus is that the account holder does not receive SMS messages about the transfer of funds, they are intercepted by a Trojan.

A quick recommendation: make an additional one to your main card in your bank. Using the second one, it is recommended to pay online. It will be easy to transfer small amounts of money there, and in case of data compromise, it is enough to simply block it.

Twin Sites

Another type of fraud that both individuals and companies suffer from is typosquatting, or in simple words, twin sites. Here the criminals are counting on your inattention. Like any other fake, a duplicate site can be distinguished from the original one. The most important thing is to check the address: a fake site will contain a distorted name, and connecting to it will be unsafe. To solve such problems within the business, it is important to closely monitor security updates, inform your employees and periodically contact professionals who use different kinds of analytic data platforms. So your security will definitely be maximally adjusted to reality.

Email

Most often we keep documentation using our e-mail: we forward documents, conduct business correspondence. We receive confirmations about our orders and purchases by email. How do I protect my email? It is important to understand what exactly you are using your mailbox for.

It is worth remembering that there are paid services for mail, there are free, and there are corporate ones. The degree of protection is provided by the server administrator. There are detailed requirements for corporate mail, they say what can and cannot be done by an employee of the relevant enterprise. "Ordinary" users avoid paid services, they don't want to spend money, but if you need mail protection, you need to read the user agreement and follow it.

Truth and Myths

How dangerous is cybercrime in the scientific and technical sphere? There is such a legend, which has not yet been confirmed, that hackers can even enter the hospital's information system and turn off, for example, a ventilator, and eventually a person will die. These are attacks on infrastructure.

Experts say that such stories about hackers disabling medical devices are still unproven information, although they are chilling: after all, this is a completely new, fantastic way to deal with someone. As a matter of fact, a new way of contactless killing. But in general, such attacks on infrastructure are quite possible and very dangerous.

***

These are the practical and theoretical foundations that each of us should know. This is just the tip of the iceberg, the topic of cybersecurity is very broad. Develop and learn security on the Internet! It is important not only for you but also for your business.

Check the comment section for additional information, or share what you know or ask a question about this article, by clicking the 'View or Write Comment' button below.

Note: Some of the information in samples on this website may have been impersonated or spoofed.

Share this article with others.
Write / View Comments (0)
View on Online Threat Alerts (OTA)
Help Maintain Online Threat Alerts (OTA)