Смартсорсинг.ру

Сообщество руководителей ИТ-компаний, ИТ-подразделений и сервисных центров

Статьи в блогах Вопросы и ответы Темы в лентах Пользователи Компании Лента заказов Курс по ITSM

Best Ways to Keep All Your Information Secured

For years, people have been warned to keep their personal information safe when working online. Due to the impact of COVID19, more and more people are doing their daily work online, increasing the likelihood of fraud and online fraud. According to a recent United Nations survey, phishing websites increased by 350% in the first quarter of 2020.

 

More than ever, you need to keep your valuable personal information safe. Common sense, along with some basic tools and tips, helps identify potential phishing websites and other potential cybercrime attempts, thus reducing the risk of being a victim of scams and scams.

 

Tip 1: Find a Link

Phishing websites are often designed to contain URLs or links similar to the website you are trying to emulate. For example, a website with a link to www.yah00.org could be a phishing site that abuses people trying to access Yahoo.com. Hover your mouse over the link to see the URL of the link. The URL will appear in your browser or in the corner of the email. Also, if possible, enter the URL in your browser instead of clicking the link.

 

Tip 2: Evaluating Website Content 

Another common tactic used by phishing websites is to create a website that has the look and feel of a commonly used website. If you accidentally click on a link to a phishing site like the one above, you may be redirected to a website similar to  Yahoo.com.  If you want know-how evaluation is done then take the help of elasticsearch training here all the data is stored and you will understand how things work.

 

However, phishing websites may have flaws not found on professional websites, such as English corruption, grammatical errors, and low-resolution images. These are common warning signs from phishing websites. Another symptom of phishing websites is the lack of contact information or "contact" pages such as company addresses, phone numbers, email addresses, company social media channels. If none of this information is on the website that requests your personal information, we will treat it as suspicious.

 

Tip 3: Be careful when connecting to public networks

The convenience of online banking and finance websites allows users to access and trade financial records anywhere on the Internet. But when it comes to security, not all networks are created the same. Free WiFi in coffee shops may not provide the same encryption and protection as your home router or computer network. Avoid accessing sensitive websites such as: For example, if you are using a public or unsecured Wi-Fi network, consider your personal banking site and over the network.

 

Consider whether a third party can view or retrieve the information you send. When shopping or banking online, continue to use websites that use encryption to protect information on your way from your computer to the server. The safest approach is to make sure your WiFi network is protected and that the websites you visit have the latest encryption and security. If a website's address is prefixed with "HTTPS", it means that the website is secure.

 

Tip 4: Keep your software up-to-date and avoid malware

Malware is a program or application that allows hackers to break into your computer for malicious purposes such as stealing personal information. These types of programs can hide behind many seemingly useful areas and wait for you to accidentally install them on your computer.

 

Outdated software is easy for criminals to invade. By setting the operating system and web browser to update automatically, it closes common security holes targeted by malware authors. To verify that you have set up automatic updates, look for the feature in the software settings.

 

Another common trick used by malware authors is to insert a pop-up message in your browser indicating that your computer has been scanned and malware has been detected. Avoid following links from these unplanned messages that often lead to phishing and malware websites. Pop-up blockers can be used to reduce the number of attempts by this malware.

 

Even with precautions, malware can still get into your computer. Therefore, be aware of the following signs: The computer is slow, the battery is discharging rapidly, unexpected errors are displayed, the homepage has been changed, new icons or toolbars are displayed without permission.

 

If you suspect malware, refrain from activities that require passwords or personal information, such as browsing the web. B. Online shopping or banking until  IT professionals can check your computer and identify security breaches.

 

Tip 5: Password Management Practices

Passwords are often at the forefront of website security. They are the key to the front door of your online account. Also, new security protocols will continue to work against unauthorized account access, but stolen passwords are the easiest way for someone to break into your personal account. Here, elasticsearch also can help you because most of the data is stored in elasticsearch engine at that time password security is important and also to understand this concept many choose to take part in the best elasticsearch course.

 

Here are some common ways to ensure that secure password management is used when processing financial and other personal information online.

  • Use at least 10 characters. 

  • Make it unpredictable. Do not use names, dates, or common words. Mix numbers, symbols, and capital letters in the middle of the password, not at the beginning or end of the password.

  • Do not use the same password for many accounts because if it is stolen from you (or one of your companies), thieves can use it to hijack all your accounts.

  • Do not give your password by phone, text or email. Legitimate companies do not ask you for your password.

  • Whenever you write down your password, put it under the key and key.

 

Two-factor Authentication (TFA) is another form of verification that makes it difficult to use compromised account passwords. Accounts that support two-factor authentication require both a password and additional information to log in to the account.

 

The second part could be a code sent to your mobile phone or a random number generated by an app or token. This protects your account even if your password is compromised. Make sure to use TFA on websites that offer that additional level of security.

Комментарии (0)