Het kost misschien tot een uur, maar het kan heel veel schade voorkomen als de beveiliging minstens goed en liefst optimaal ingesteld is. Onderzoeken wijzen uit dat zo’n 70% van computer gebruikers geen aandacht schenkt aan het meest cruciale onderdeel: beveiliging of ‘Security’. Dat hetzelfde als deuren die uitnodigend openstaan … en niemand thuis is.
Dus neem even de tijd en doe het volgende:
- Stel een serieus wachtwoord in
- Zet altijd de ‘Firewall’ aan
- Installeer goede antivirus software
- Installer een ‘VPN‘
- Gebruik als ‘zoekmachine’ DuckDuckGo
- Installeer altijd direct de aangeboden ‘updates’!
- en … maak ALTIJD een ‘Backup‘
- Gebruik altijd een passwordmanager.
- Maak gebruik van de 2-traps-authentificatie: naast het wachtwoord wordt een code naar de smartphone gestuurd om in te loggen
- Ligt jouw wachtwoord ‘op straat’? Check dat met link
- Overweeg Secure e-mail, gebruik de gratis Protonmail optie.
- Download alleen programma’s van vertrouwde aanbieders
- Log bij voorkeur in als gebruiker en niet als ‘administrator’. Voor het merendeel van wat op de computer wordt gedaan, zijn geen ‘administrator-rights’ nodig. Als gebruikers wordt je eerder gewaarschuwd
- Zet de computer uit als die niet wordt gebruikt. Niet online betekent namelijk niet te ‘hacken’. Dat geldt trouwens ook voor de ‘smartphone’
- Overweeg encryption.
- En vergeet niet: de ‘webcam’ kan ook gebruikt worden door criminelen.
Be aware off 1. Ransomware has been a tremendous threat to users all over the globe and has only been getting more sophisticated and troublesome over time. Hackers can gain access to your computer, encrypt your files and demand a payment in return for your files back.
Traditional ransomware will evolve from targeting individual users and computers, to being capable of infecting hundreds of machines simultaneously; similar to what recently happened to the Municipal Transport Agency in San Francisco where 2000 systems were locked with ransomware. It will also evolve in a direction similar to what recently happened with Popcorn Time where users were urged to infect two other users instead of being infected themselves. There’s a good chance that these tactics will become more advanced and widespread in the upcoming year.
How to stay safe? Be sure to back up your files with a high-quality back-up solution to protect your personal information. This is a great precaution to ensure that your files are safe and accessible to you for free no matter what happens. Exercise extreme caution when opening up email attachments and clicking on links sent to your email.
2. DDoS As more devices are becoming internet enabled, the security measures meant to protect these devices aren’t keeping up. The Internet of Things is meant to bring household devices together to communicate with us and each other. By default, these devices are open and available to the internet and are protected with default passwords. Hackers are increasing their attention to new ways of leveraging IoT devices for malicious purposes. These devices bring a vulnerability to the network they are connected to, making it easy for hackers to take advantage of them.
IoT devices are utilized for Distributed Denial of Service (DDoS) to flood a targeted website by an overwhelming amount of requests from millions of connected machines, exactly like the Mirai Botnet this October. Smart devices use open public ports so that they can be accessible away from home. Hackers establish a large database of these open ports to form a botnet, a large amount of exploitable ports they can infect with malware. These devices are then used to transmit small amounts of data to aid in a DDoS attack.
How to stay safe? Change the default username and password through the appliance’s hub either on the smartphone app or through the manufacturer’s website. This step is necessary to secure your routers, printers, web cameras, DVRs, and all connected smart appliances. Check for firmware updates to ensure there aren’t security patches that leave you vulnerable.
If you aren’t sure if you’re at risk, it might be a good idea to reboot your machine since malware in IoT devices are only located in the device’s temporary memory. In order for hackers to carry out a massive DDoS attack, they would be required to infect and re-infect new devices every day if they were rebooted.
3. Hack Hackers look for various ways to break into a network, and usually they can accomplish this by exploiting unpatched software security holes. The goal of their hack is to commit identity theft by stealing your sensitive personal information and pretend to be you. Hackers break into networks and gain access to this information without means of phishing or through ransomware attacks.
How to stay safe? Ensure that your applications and operating software are regularly updated with the latest security patches. This will ensure you’re fully protected from a hack attack.
4. Phishing The number of phishing attacks are on the rise, as they have been for the past few years. Emails disguised as banking or work emails prove the most effective at tricking people into thinking they are legitimate. These emails then link to a webpage that looks legitimate but is actually fraudulent and will request credit card and bank account information, as well as other sensitive personal details. These websites are created to spread malware and to gain access to your personal information. Learn more about how you can spot a phishing attempt and how to protect yourself from identity theft.
How to stay safe? Be very cautious when clicking on attachments or links from an email, always look at the URL spelling to ensure there aren’t any typos and be very wary about inputting personal and financial details online. It will be very helpful to have an effective antivirus solution that includes anti-phishing protection to ensure you’re safe from phishing attempts as a robust second line of defense.
5. Typosquatting Nearing the end of 2016, we noticed a lot of fake news articles making their way around the internet, inspiring a new way for hackers to distribute malware and attempt to steal your information. Cyber criminals are now making fake websites that are intended to look exactly like the real one, by securing URLs that have a slight typo from their legitimate counterparts. After you type in the URL, the website is designed to look exactly like the original, so you wouldn’t even think you made an error inputting the web address.
They do this in the hopes that you would input your credentials, believing that you’re providing this information to a site that you can trust. In some cases, these websites distribute malware while also being a phishing scam, hoping to steal your personal and financial information.
How to stay safe? Double check when you enter a URL that there are not any typos in the web address. It is advisable to make bookmarks on your computer with the legitimate websites and this will help to ensure that you’re accessing the real website every time. Ensure you’ve updated your antivirus software to ensure you won’t be a victim of typosquatting.
Clifford Stoll Treat your password like your toothbrush. Don’t let anybody else use it.