Cybersecurity
Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security . The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.
These are 6 ways you can improve you computer security in Less than an hour
1.Go online with a secure with a secure browser:Your web browser is the main tool you use to access internet and you should pay a great deal of attention to secure it correctly. At the same time ,vulnerability are like open open invitations to hackers .By using this open doors ,online criminals attempt to retrieve private data from your system .
To Secure your online privacy ,you can follow these recommendations .
▪︎Choose the latest version of your browser and make sure you have the latest security patches installed. This is important and keeps your system secure from online criminals attacks .
▪︎Increase your privacy and security settings in your browser .
▪︎Choose a private browsing session when you access a website you are not sure about .Choosing this navigation will prevent your browsing session details from being stored
▪Use secure websites for sensitive financial operations. To visit a secure websites,make sure the web address starts with "https://".The "s" stands for Secure Socket Layer " and it indicates you are connected to a website where data which is sent and received is encrypted .
2.Use strong passwords for your email and social media accounts:These are a few things you need to pay attention to when dealing with setting good passwords for your online accounts .First of all dont use the same password for in more than one online account .
The reason is it's quite easy to guess:if one of your online account is hacked,then the others will soon follow .By using different passwords,you reduce the potential loss you could suffer in case this privacy breach takes place .One of the best ways to ensure your online accounts are not accessed by anyone else but you is to use the 2 step verification method. Activating this method means that you will have to enter ,beside your credentials,a code sent to your phone.Using this method ,you can protect private information from social media accounts or important data from your email account .
3.Stay safe from spy ware threats with a specialised security solution :Fist ,let's establish fast ,what exactly is spyware?Spyware refers to software which is capable of installing on your computer and starts opening pop-ups windows ,redirects your browser to malicious websites and monitors your browsing sessions affecting your private internet connections .
4.Keep your Windows Operating system and your vulnerable applications up to date :Many people don't take this seriously,since most security solution are mainly created for malicious software But software vulnerabilities are not something you can ignore .Taking advantage of software vulnerabilities present in in popular programs and applications is a popular method used by online criminals. So,if you know you use popular software like Java,Adobe flash,Adobe shockwave ,Adobe Acrobat Reader,Quicktime or popular web browser web browsers like Chrome,Mozilla firefox or internet Explorer,always make sure you have the latest available patches.You need to understand that these software solutions are always under threat from criminals minds ,so don't rely on your memory and install a dedicated solution to perform these actions for you.
5.Use a standard user account in your windows operating system to go online:Different levels of rights and privileges are available for the windows user accounts. I recommend using a standard windows user accounts to access internet. If you use a standard account in your windows operating systems ,you make sure that a piece of malware which could infect your limited user accounts will not be capable of doing great damage to your system. Only an administrator account can make significant changes to your system,like deleting important windows related files or installing malicious software. If you use your standard account,you will have to provide the credentials for the administrator account every time you make an important change
6.Dont trust public and Free wifi :Be careful when connecting to public and free wireless networks. One of the favorite methods used by online criminals to retrieve your credentials is by using wireless sniffers to access data sent over unprotected networks. One way to increase your security is by using a “private browsing” session, this way you make sure your creden-tials won’t be stored locally. Nevertheless, this won’t stop the Internet Service Provider or anyone else “listening” out there to catch your private communication.With the increasing danger of online theft and lack of privacy on popular social platforms, such as Facebook, you need to safeguard your freedom and protect your Internet activities. One way of keeping your browsing session private and secure is to use a VPN
Essential Cybersecurity Terms You need To know
Cyber Attack:A cyber attack is classified as any type Of offensive action used by cyber criminals to deploy malicious code in your system with the purpose of stealing,altering ,destroying or taking any advantage from this action
Drive by Download:A drive by download can refer to two things
a.A download which you authorized but without understanding the consequences
b. The unintentional download of a virus or malicious software onto your computer or mobile devices
HOW YOU CAN GET INFECTED
Drive by download can happen when you visit a site when reading an email or by clicking on a deceptive pop up window.These type of malicious downloads usually take advantage of a browser,snap, or an operating system that is out of date and has a security flaw that has not been solved or patched.This is why its crucial to constantly maintain your software updated
Keylogging :Keylogging is a method that cyber criminals use to record the keys you strike on your keyboard in order to get confidential about you.Of course they do this in a concealed manner,so that you wont know you are being monitored while typing passwords ,addresses and other secret data on your keyboard as usual
HOW YOU CAN GET INFECTED
Keyloggers are usually used with malicious intentions to steal passwords or credit card information. Although many anti spy ware applications can detect some software based keyloggers and quarantine,disable or cleanse them,there is no solution that can claim to be 100% effective against this type of threat
Malware is one of the terms you will hear most often when it comes to Cybersecurity threats .the terms defines any software used by cyber criminals to
▪︎disrupt computer operations
▪︎ gather sensitive informations
▪︎or unlawfully gain access to private computer systems .Malware is characterized by its malicious intent ,because it acts stealthily to steal your information or to spy on your computer for a long time,without your knowledge. Malware is a general term used to refer to an entire category of malicious or intrusive software including computer viruses ,worms,trojan horse ,ransomware,spyware ,adware ,shareware and other harmful programs.
HOW YOU CAN GET INFECTED
Malware is usually spread through executable code ,script ,active content and other software .The major threats is pose comes from malware being disguised as or embedded in,non -malicious files such as .jpeg,.mpeg,.exe,.gif,.mp3 and many more
Trojan Horse:A trojan horse is a type of malware that conceals itself as a normal file or program to trick you into downloading and installing malware.A trojan can do many dangerous things to your system like cyber criminals unauthorized,remote access to your infected computer ,once that happens ,cyber criminals can
▪︎steal your data
▪︎install more malware ,modify files
▪︎monitor your activity
▪︎use the computer in botnets
▪︎encrypt your files ,like in the case of ransome ware
HOW YOU CAN GET INFECTED
Through email attachments
Software or music download
Unsafe instant messages
Drive by downloads
Peer to peer downloads
Routine forms that needs to be filled in
5 Deadly Sins of Password Management
YOU must not keep your passwords in a text file ,spread sheet or unprotected documents
2.You must not use the default assessors sent to you by a service provider
Those passwords are simple and easily breakable
You must not use words that can be easily guessed or simple phrase
You can test your passwords strength by using howsecureismypassword.net
Thanks for checking my article,please like and subscribe
Meet my amazing sponsors.....ooops I've got none. Wanna be one???
to stay secure in simple steps: Update your antivirus, Add a second antivirus or anti-malware (eg. Malwarebytes), Use browser with better privacy (im using edge coz its better than chrome), install adblock in your browser (eg. Adblock, uBlock Origin, Adguard), Update your OS, and stay out of unsafe websites.