Courtest of Wikimedia Commons |
For more than a decade, hackers and
cybercriminals have been increasingly wreaking
havoc on business, government and the general public. Cybercrime has increased by
a 100-fold in the last decade. Now it’s time to counterattack! But how, you ask?
By what means do we have to counter this ever-growing menace? The fact is, we always could stop most hack attacks in their tracks.
It’s just that people and businesses and governments try to implement what I call
the least effort most gain strategy. This
does not work! What does work is to implement the
tools available and to then continuously upgrading your capability to stop
all threats. Plus, there are new security
measures available to make it much harder to breach your defenses. By implementing
new and time-tested measures to thwart cybercriminals dead in their tracks, you
can safeguard your digital domain.
What are these new and tried and true
security measures? How can a business, government, or individual protect themselves
from the increasing threats of cybercrime? In this episode of Working the Web to Win, we will explore new security measures that
have just been released by Google and other companies to help counterattack the
latest hacking threats being perpetrated by
cyber criminals and rogue nations. We will also provide a detailed security plan
that will stop most cyberattacks in their tracks. This will provide the reader with
a list of potential threats and a means to further thwart hack attacks. So, get
ready to print out this article and bolster your security as we delve into the latest
in internet security methods to counterattack those who hack.
Courtesy of Army.mil |
In earlier articles, I have discussed many useful
measures that thwart most hack attacks. Today, most of the hacks occur
because people are easily enticed to foolishly give up access to their systems by
falling for the temptation of unrealistic offers. Too often people don’t vet their emails, websites, and texts. All too often
people, of all ranks, while using social media, give up precious personal information
that can compromise their security.
Stop the Bleeding - In contrast, maintaining a security mindset, implementing, maintaining and upgrading basic security measures can stem the tide of constant attacks. For example, upgrading to a 12-digit password is much harder to guess than an eight digit one. Changing your password every six months makes it even harder for cybercriminals to take advantage of you, even if they stole your information during the Equifax breach. Upgrading to a two-step authentication from just a username and password only, is another exponential leap in security. Often, I have written about using a multi-layered anti-malware defense because this is better than just having one program protecting you. Make sure you check out the more than two dozen articles we have written regarding cybersecurity. These articles provide cybersecurity principles, and good security principles don’t expire, you just keep adding more of them to your defense.
New Security Measures - Not long ago, Google upgraded its account sign-in & security
consoles. They added a security and privacy checkup feature along with
a means to monitor your user login activity
on your accounts. In this console, you can
set up two-step
authentication where Google sends a code to your phone as
an additional security
measure to use during logging in. Google recently announced that it was adding
additional authentication measures for individuals who work in high-risk occupations.
These include politicians, other
officials, high net-worth individuals, activists, dissidents, and journalists. Google’s
new system implements the use of a hardware USB key that must be connected to the
device for you to complete the log in process. A Bluetooth one is available for
mobile devices. This is an exponential upgrade
even over two-step authentication. This new
authentication process isn’t vulnerable to phishing sites that spoof Google’s login
page, even if the cybercriminal has your username and password.
Courtesy of Wikimedia Commons |
Plugging the KRACK - Hacking hardware vulnerabilities have
been around for a long time. Now a new security hole in all WIFI systems has
been exposed. This new vulnerability, nicknamed KRACK,
makes it possible
for a hacker to intercept authentication handshakes and to capture the information
in order to use it to gain access to your network. This is especially true of IoT
devices like smart TVs and other IOT devices. If you're using WIFI, you are vulnerable. The good news is that WIFI can
be updated and patched. Updated drivers are available for most network cards and
Windows systems. The industry will be releasing updates for all WIFI systems. The
bad news is that this will take time. So, what does this all mean? It means you must take a comprehensive approach
to security. This means plugging the security
holes where ever they appear. It’s a necessity to make sure that your hardware drivers
are upgraded on a regular basis. I use a program
called Driver Booster 5 to keep my hardware drivers up to date.
Courtesy of Wikipedia |
Adding More Security and Privacy - Another very useful security measure
is to increase privacy by using a VPN, (aka Virtual Private Network) to gain access
to the web. Virtual Private Networks can provide additional encryption layers
to your information and make it much harder for a cybercriminal to discover your
IP address. This adds a greater level of security
and privacy. An Article
on the ezine, “Guiding Tech” by Yadon Chen, explains what it is and how it works. Along the same lines, make sure your websites, blogs and social
networks are using HTTPS protocols. This will
also make your sites more secure and private. It will also bolster consumer confidence
and improve your ranking.
Courtesy of Flickr |
Creating a Multi-layered Defense - Speaking of
using Advanced System Care, we employ it as part of a multi-layered defense. We
believe that no single anti-malware program can protect you from every kind of malware
attack. So, we use multiple programs to protect our digital devices. And when I
say digital devices I mean all of our devices, including computers, tablets, smartphones and any IoT devices that allow the installation of malware
protection. This multi-layered approach only
has a few drawbacks. First, you must buy all three applications to protect your
systems. Second, you have to find anti-malware applications that will play nicely together. Third, having three applications
running simultaneously slows the overall performance
of your system, (although a good computer with lots of RAM will operate fine).We
have been using Trend Micro, Malwarebytes and IObits Malware Fighter Pro for years. I now substitute Advanced System Care Ultimate for
Malware Fighter Pro so that I only have three
anti-malware apps running. The trick to running all three of these systems together
is to install Trend Micro first, then Advanced System care or Malware Fighter and
then Malwarebytes last. Finally, you must tell each program to ignore the other
when they flag each other during security scans. It is also worth mentioning that
you can also turn on Windows Defender as it will also play nice with these three
anti-malware products.
Courtesy of WorkingtheWebtoWin.com |
I thought it would be appropriate if
I provided a simple security checklist that anyone could follow, to upgrade their
security measures. Here are my top seven checklist items for you to implement. Following
it will make your digital life safer.
My Top Seven Cybersecurity Items Checklist
□ First, adopt a security mindset. Always assume you’re being attacked.
Don’t engage in needless and inappropriate
web surfing and don’t succumb to the temptation
of offers that are too good to be true. Teach your kids appropriate Internet behavior
as well. Purchase and monitor your family’s credit and bank info with an ID protection plan.
□ Second, install, implement and maintain a multi-layered malware security defense system. Make sure you keep them all up to date. Do this on all digital devices your family owns, even IoT devices if possible.
□ Third, update all hardware drivers, software application, browsers and plugins often. If possible set up an automated update system. Don’t forget to update your WIFI system.
□ Fourth, implement a 12-digit username and password that includes numbers, letters, and special characters. Do this on all devices, especially your smartphones and tablets.
□ Fifth, if you are a high-risk internet user, add a hardware protection key layer to your defense. People like politicians, other officials, high net-worth individuals, activists, dissidents, journalists and even cybersecurity experts should heed this advice.
□ Sixth, if you own a business, make sure you take advantage of a VPN for internet access and HTTPS protocols for your website and blogs. Having secure access and showing that your website is secure will help you keep your business safe.
□ Seventh, read and learn as much as you can. Cybersecurity is an ever-evolving process. You must stay abreast of current threats and evolving countermeasures. This arena changes rapidly and not committing to ongoing vigilance is a big mistake. Write your congressmen and ask our government officials to implement a committed program to deal with this threat along the lines of what they did to put a man on the moon.
□ Second, install, implement and maintain a multi-layered malware security defense system. Make sure you keep them all up to date. Do this on all digital devices your family owns, even IoT devices if possible.
□ Third, update all hardware drivers, software application, browsers and plugins often. If possible set up an automated update system. Don’t forget to update your WIFI system.
Courtesy of Pixabay |
□ Fourth, implement a 12-digit username and password that includes numbers, letters, and special characters. Do this on all devices, especially your smartphones and tablets.
□ Fifth, if you are a high-risk internet user, add a hardware protection key layer to your defense. People like politicians, other officials, high net-worth individuals, activists, dissidents, journalists and even cybersecurity experts should heed this advice.
□ Sixth, if you own a business, make sure you take advantage of a VPN for internet access and HTTPS protocols for your website and blogs. Having secure access and showing that your website is secure will help you keep your business safe.
□ Seventh, read and learn as much as you can. Cybersecurity is an ever-evolving process. You must stay abreast of current threats and evolving countermeasures. This arena changes rapidly and not committing to ongoing vigilance is a big mistake. Write your congressmen and ask our government officials to implement a committed program to deal with this threat along the lines of what they did to put a man on the moon.
The following is a short list of articles
we have written on cybersecurity. You can
find a lot more by entering cybersecurity in the search box on the upper right-hand
side of our blog.
Article Worth reading
The last decade has ushered in the era
of the hacker. This threat endangers our very way of life. It’s time for all digital
users to take responsibility and to increase the security of all digital systems.
We can greatly reduce any hacker’s capabilities by just implementing the above seven
items. Most cybercrime is made possible because we are not performing our due diligence,
implementing sound practices and not maintaining our security capability. By implementing
just these seven items, you can cut cybercrime
dramatically. Become part of the solution,
not the problem. Implement these seven items and take back your cyberlife.
Get your FREE COPY today. |
That’s my opinion; I look forward to reading yours.
In this article, I have discussed
how cybercrime has become the number one threat we face as a society and how we
can counterattack this threat by implementing new and proven security measures.
I provided a security implementation checklist of seven items that can make a dramatic
difference in the war against cybercrime. These seven items, if implemented will
greatly curb a cybercriminal’s ability to hack anybody’s digital systems.
If you feel your business could use some help with
its marketing, give us a call at 904-410-2091. You can also fill out the form
in the sidebar of this blog. It will allow us to provide you with a free
marketing analysis to help you get better online results. Our claim to fame is
that we are one of a few companies who actually provide ironclad guarantees.
Great post Hector. I have shared it on my facebook page.
ReplyDeleteThanks Glenn, I really appreciate that coming from you.
ReplyDeleteThank you for the great post. I like a way you describing the content. The points you raised are valid and suitable. I am an SEO Expert Telling you about trend micro support. trend micro support service helps you get set up, virus resolve. Let's talk to our experts to take payroll off your hands.
ReplyDeletehi,
ReplyDeleteI am . am Tech support Expert I found this information important I would like to get similar information further.