ONLINE SECURITY ACROSS PLATFORMS: A PARAMOUNT
HOW TO DETERMINE IF A WEBSITE IS SAFE
The cyberworld is big that we often
disregard the fact that we might be unsafe in accessing websites. Here are some
tips to safety.
·
HTTPS - Normally, entering
Google or any browser, we often use links that starts with “https”. The “s” at
the end stands for secure. This indicates that it uses and SSL(Secure Sockets
Layer) connection. If you see if the website is using “http with an s”, that
means that it is secured with an SSL certificate.
·
LOCK IT -
If you have noticed a lock icon on the left side of the link that is actually a
sign of security. The lock icon position may vary in different browsers. Here’s
an example (Google).
·
Antivirus software –
by using a security tool such as an “antivirus”. Oftentimes, this helps your pc
to block access on websites that are unsafe. Automatically, the software will
not allow the website to work whenever detected.
·
URL check –
if it’s coming from a legit company, there’s no way that they will display
typos. Companies will surely check all the details displayed in their sites. In
some cases, grammatical errors, missing letter, changing letters to numbers, is
a crystal clear sign that this might be a scam. In short, the site is not safe.
·
Check the site owners
– There are times that an organization website does not display names of the
people involve in the organization. Instead, they only put the name of the
organization and you would know that it’s legit. However, it is always important
to check the people such as those editor, content creator, or writer in the
site in order for us to confirm that it is safe because it’s made by legit
people.
HOW TO IDENTIFY EMAIL AND OTHER SPOOFING
SCHEMES
Phishing is a common cybercrime where criminals used and steal your data such as those login credentials and credit card numbers. Spoofing is a disruptive algorithmic trading activity employed by traders to outpace other market participants and to manipulate markets. For instance; when an email is sent from a false sender address that asks the recipient to provide sensitive data. When we click on this, this contains malware. In order for us to figure out whether it’s some sort of malicious scheme, here are some points that can help us.
- Check the email domain – Emails from a school usually has “.edu” as part of the domain name. That proves that you are a student, teacher, or staff of the school. In companies also, they have their designated domain name in order for the customers to identify that they are legitimately working in the certain company. In the email format, we can see the name of the sender and we quite settle on that. We should always bear in mind to always check the real email and its domain name. Furthermore, search the company name on Google to gather information about them.
- Misspelled domain name –
if it’s a legit email with the right domain name, there will never be a time
that it will be misspelled. Not unless, it’s not legit and it came from bogus
mails.
- Poor content email –
if it’s a mail coming from a company or from some institution, the contents are
surely written in formal and the correct way possible. If the email seems to be
unorganized, not properly punctuated, not in proper writing format, this might
be a scam and may come criminals.
- Link attachments –
In phishing emails, we might have received an email with link attachments. The
letter might say we need to click on the link and follow the directory in order
to get some prizes. However, this is just a trick for us to open the link and
acquire or download malicious files.
- Emails with “urgency” –
Most emails we received always say that we won a cellphone or laptop and that
we really need to respond in less than a second. First of all, how can you win
something if you know that you didn’t join any raffle draw? Secondly, no one
will give something for free. That email sparking “urgency” is a sign of
phishing, spoofing, or scam, in general.
GUIDELINES FOR DOWNLOADING PROGRAMS AND APPS, EMAIL ATTACHMENT SAFETY
- Always check the website address whether it can be trusted so we can ensure security.
- Use active virus and malware scanners so your software will be the one identify unsafe websites.
- Trust your gut feeling. If you feel like the site cannot be trusted, then find something else.
- Check the download links if it’s really the direct download link.
- Install the file with all the safety measures implemented.
- Do not give your email address during installing process.
HOW TO AVOID PHISHING SCAMS
Scammers often exist online. They have so much time
create bogus mails just to illegally get money from the victims. Here are some
tips for us to know when it’s a phishing scheme and on how we can protect ourselves.
- ·
Scammers may sent us
a text or email asking for our personal information. Do not give any if you
know that you haven’t even met the sender.
- · A common trick is they say “there’s a problem with your bank account information”, “there was a suspicious login in your account”, and “offer free stuff”. First of all, if there is unusual use of your credit card, the bank will notify you. If they use a domain name of the company, which is one area we should all look at because that is undeniably fake.\
Here are 4 quick tips
of protection:
- 1. Protect your computer by using security software
- 2.
Protect your cellphone by setting it to update
automatically
- 3.
Use multi-factor authentication across all accounts.
- 4. Back up your data.
HOW ORGANIZATION USE COMMON SAFEGUARDS
TO PROTECT OTHER USERS ON THE NETWORK
- ·
Firewalls –
According to CISA, it provide protection against outside cyber attackers by
shielding your computer or network from malicious or unnecessary network
traffic. Firewalls can also prevent malicious software from accessing a
computer or network via the internet.
- ·
Proxy servers -
A proxy server is a system or router that provides a gateway between users and
the internet. Therefore, it helps prevent cyber attackers from entering a
private network. It is a server, referred to as an “intermediary” because it
goes between end-users and the web pages they visit online.
- ·
Username & Passwords – In any platforms online, we are always ask to make an
account, username and a password. Passwords provide the first line of defense
against unauthorized access to your computer and personal information. The
stronger your password, the more protected your computer will be from hackers
and malicious software.
- ·
Audit trails –
According to audit board, audit trail is key in defending against security
breaches and protecting against internal fraud, and critical to maintaining
compliance in financial reporting for passing both internal and external
audits. Any industry handling sensitive information needs to maintain solid
audit trails for their data. Furthermore, An audit trail is important because
it's used to verify and validate financial, software, and business transactions
by tracking selected user activities or accounting financial statement amounts
back to the transaction, event source, and data access used to create or modify
a record.
Comments
Post a Comment