Internet Security

Internet Security 101: By Jacob

These days, clicking link after link is pretty much the norm for most people just browsing the web. This so called ‘website binge’ leads many users to easily forget about the plethora of malicious intent that is targeted at internet-supported devices. The possible risks to you include: devices being hacked and compromised by a cyber-criminal, unknowingly falling into the clutches of scammers online, and being tricked by malicious software that may damage your computer while stealing essential personal-information – information that can be easily utilized to steal your identity and cause you more headaches down the road.

In today’s digital age, no one is safe (even governments) because cyber-criminals are always developing new methods to ‘get you,’ usually within a short timeframe after security companies patch through their updates. People do not always have the best intentions in mind, which is why maintaining cyber awareness of the possible threats to your computer and data is of utmost importance. Case in point, it never hurts to have more knowledge pertaining to these dreadful confrontations on the internet. So here are a few tips to be more cyber-aware while on the internet.

  1. Don’t just randomly click a link or randomly visit a site you’ve never visited before. This is just asking to be compromised. Instead, evaluate the link, and make an informed decision about visiting the site

  2. Never say “that will never happen to me.” That kind of mindset will make you more likely to fall for attacks. You can reliably protect your own info, keep security measures in place, and discover issues quicker by keeping a keen watch on your accounts.

  3. Staying updated on the latest security threats is highly valuable in the never-ending battle to overcome cybersecurity challenges. For this, I would highly recommend downloading Cisco’s free cyber-security report, which explores the latest trends cyber-criminals employ.

The Basics Of Protecting Yourself Online: By Jacob

In a similar manner to how we value peace of mind knowing we’re safe in our homes from outsiders and the outside world, cyber security is the same idea – we all want to feel relatively secure behind the screen without falling prey to cyber criminals. I think the most important aspect in this regard is the actual identification that something may amiss; rather, common indicators that you may in-fact have a legitimate security issue. This is because unless you can identify the wolf in sheep’s clothing as it were, you might be dinner for the wolf. There are a variety of ‘symptoms’ your computer could have – some of these may just be attributed to poor maintenance of the computer – whereas other times you might actually have a security issue on your hands. One of the most common symptoms users may have experience is a slow computer when it “used to be so fast!” This applies primarily to computers with Windows operating systems. As stated previously, this slow-down is most likely the result of poor ‘maintenance’ of all the data and files on the system, which can clog up your system over time. Count your lucky stars, because there is an amazing and FREE software (super user-friendly) that you can use to essentially restore your system – it is called CCleaner. This simplistic program enables you to quickly and efficiently get rid of the majority of the ‘junk’ you got laying around somewhere on your system. A few highlights that I believe are the most useful portions of the software include: getting rid of unnecessary system files and website data (which slow your system down), fixing a corrupt registry (no good, as it can lead to system errors down the road), and the ability to customize precisely which programs and files you do or do not want ‘cleaned’ by the program. This will work in many cases. However, if you find that maintenance of the system fails to produce visible results or if system performance seems to become even worse, there is a high possibility that your data could already be compromised and in the hands of some no-good criminal. It is almost too easy for hackers to break through most firewalls, and any decent hacker can case un-secured internet connections. Hence the use of a VPN (virtual private network). Before you go browsing away on the web, I recommend Avast Secureline VPN. It has a free 7-day trial and can make your real IP (location) appear somewhere completely different, in several different states and countries if you want! This is merely another effective way to stop hackers in their tracks – the premise being if they can’t find you, they can’t hack you.


Defending Against the 9 Main Forms Of Malicious Software: By Jacob

No matter what device or what operating system you may be using, today’s ever evolving cyberthreats are no laughing matter. The first step is understanding what you’re up against. So here is an overview of the major types of malware and viruses, including the impact they may have.

But what exactly is malware? In general, this is a term used to describe any malicious program that is usually installed without the user’s consent – these programs can cause havoc on your system, including system slow-downs, data mining of sensitive data, encrypted and corrupted files, and even hijacking of the device. As security experts continually update their software, hackers incessantly develop ways to infiltrate user systems. This is comparable to filling one hole, but two more just pop up because of that. Let’s get specific here, with a quick list of the most common threats.

  1. Viruses – Similar to biological viruses, computer viruses have the ability to ‘spread’ across other disc drives and files, infecting them as well. These are commonly received in downloads from email attachments, websites, and from external drives such as USB.

  2. Worms – Unlike viruses, worms require little-to-no human intervention. This is because as soon as they compromise a system, they vulnerability through which they entered becomes infected, allowing the spread through the device and across devices on the same network. These vulnerabilities can include missed OS and application updates, missing driver updates, and weak security.

  3. Adware – These are programs that deliver ads automatically to computers, like pop-up ads on websites and ad messages for “free” software. While some adware is benign, other variants utilize tools to track your location and browser history. While adware is technically installed with user consent, we often don’t read the fine print. Whenever you click “I agree,” you’re granting consent to the adware.

  4. Spyware – Spyware is installed without a user’s consent, and does what you’d probably assume, spying on what you’re doing on your computer. It typically collects data such as keystrokes, browsing habits, location information, and even login information. Spyware can also alter security settings and interfere with network connections on your device.

  5. Ransomware – These nasty little programs encrypt all your personal and work data – everything essential – and demand a ransom payment for their release, as in they’ll give you back the file keys for an exorbitant fee. They may sometimes claim to be the work of legitimate law and government agencies, suggesting you’ve been caught doing something illegal.

  6. Bots – As the name suggests, bots are programs that automatically execute specific operations. When one infects a host computer, they will carry out specific commands without user knowledge or consent. These are a very popular type of malware.

  7. Rootkits – These allow remote access and control to your computer by a third party. Once a rootkit is installed, it completely hijacks your system to steal data and install additional malware. Detecting rootkits requires real-time monitoring because they are designed to easily go unnoticed and actively hide their presence.

  8. Trojan Horses – These programs hide in plain sight by masquerading as legitimate files or software. When you click on these, they are discretely installed to carry out malicious activities without user knowledge or consent.

  9. Bugs – Flaws in software codes – known as bugs – are not malware. Instead, they are merely vulnerabilities that attackers with malicious intent can exploit with detrimental consequences as the result – freezing, crashing, and reducing system performance. While developer security control is constantly improving, bugs are just another reason to keep current on system updates and software patches.

Looking at the list, it’s clear that using the internet and a computer is no walk in the park. Keeping up reliable backups of data, automatic updates, and consistent security scans are key in your fight against malicious threats. There is plenty of good security software out there that can help properly protect you from threats. A few in this department that I recommend include:

MalwareBytes https://www.malwarebytes.com/

Avast Antivirus https://www.avast.com/en-us/index

McAfee https://www.mcafee.com/en-us/index.html

Norton https://us.norton.com/