{"id":1287,"date":"2024-09-22T10:50:07","date_gmt":"2024-09-22T10:50:07","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=1287"},"modified":"2024-10-19T13:16:32","modified_gmt":"2024-10-19T13:16:32","slug":"cyber-safety-steps-so-simple-even-my-mother-could-follow-them-but-probably-wont","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/cyber-safety-steps-so-simple-even-my-mother-could-follow-them-but-probably-wont\/","title":{"rendered":"Cyber safety steps so simple even my mother could follow them (but probably won\u2019t)"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"743\" height=\"350\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/09\/quote-you-can-t-always-trust-your-mother-lou-reed-133-82-42-1.webp\" alt=\"quote-you-can-t-always-trust-your-mother-lou-reed-133-82-42\" class=\"wp-image-1288\"\/><\/figure>\n<\/div>\n\n\n<p>As much as those of us who work in the security industry love the work we do, sometimes you feel like banging your head against a wall. It seems like no matter how frequently or how loudly we try to educate people on basic cyber hygiene, there are still those who go against common sense \u2013 despite the hundreds of warnings \u2013 and then wonder why their devices have been hacked.&nbsp;<br><br>Today, almost our entire lives are online. Rather than a physical burglary or a break-and-enter, criminals are going digital in an attempt to pilfer the troves of personal records, bank accounts, social media accounts, etc. that are all now online. That, I suppose, is the price we pay for the innumerable benefits of the internet \u2013 it\u2019s efficient for us, but it\u2019s also efficient for criminals who no longer have to risk a physical altercation.&nbsp;<br><br>It is critically important to keep your personal information safe by taking precautionary measures when online. Here is a list of four of the most basic, fundamental steps one can take to stop personal information from falling into the wrong hands.&nbsp;<br><br>1.&nbsp;&nbsp; &nbsp;Don\u2019t take the bait \u2013 avoid Phishy emails&nbsp;<br><br>The most common way hackers get into your computer or phone is through phishing emails. These are fake emails that say you\u2019ve won a prize, \u201cclick here\u201d to avoid IRS fines, or any other message that seems strange. Avoid clicking any suspicious links or attachments you may receive in an email, as it probably leads to malware. Even trying to unsubscribe to an email that looks completely legitimate can lead to malware or a key logger installed on your machine. Make sure the email is from a legitimate source before you give out any information, if it isn\u2019t, delete the email immediately.<br><br>When in doubt, throw it out. If you need to verify whether an email has come from a particular source, you can always contact the institution \u2013 whether it be a bank, government department, etc. \u2013 and confirm the email\u2019s legitimacy. This also notifies the organisation being imitated so they can then warn their other customers.<br><br>2.&nbsp;&nbsp; &nbsp;Keep your software updated<br><br>This includes your phone and computer operating systems, your anti-virus software, and any other applications you use. The majority of these updates include security enhancements which close the vulnerabilities hackers exploited in previous versions of the software. As painful as it is to have to sit and wait for the software to update and restart the system, it is well worth it.<br><br>3.&nbsp;&nbsp; &nbsp;Use a secured internet connection<br><br>Be careful what you do when you are connected to public Wi-Fi. You have no control of the security on the network and hackers can use the connection to hack into your device. So, if possible, it is best to avoid public Wi-Fi. If you must use it, avoid accessing any critical personal information such as bank accounts. This also includes not logging into any accounts or shopping online on public devices (like in an internet caf\u00e9 or other public terminal). Your passwords or payment information could be copied, stolen or even accidently saved to that device.&nbsp;<br><br>4.&nbsp;&nbsp; &nbsp;Use multiple strong passwords or multi-factor authentication<br><br>Lastly, and perhaps most importantly, ensure you are using strong passwords or multi-factor authentication where available. Strong passwords are those that do not contain any information that can be easily obtained, like birthdays or names of family members and pets. It is also crucial not to use the same password for everything. This way, if someone were to get a hold of one of your passwords, they do not have access to everything. Additionally, you should change your passwords every few months.<br><br>Unfortunately, the majority of people continue to use the same password across multiple web sites and applications. Think about it, your credentials are most likely for sale on the dark web right now (a rudimentary check of if you&#8217;ve been compromised is available <a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener\">here<\/a>). Anybody could use them to access your corporate applications and your personal accounts. We&#8217;re not just talking about Facebook, Twitter and Instagram but also Onedrive, Dropbox, iCloud, iTunes and Office 365. Think about what could happen if a criminal accessed your ISP, insurance, super fund, bank, and Government accounts &#8211; in effect ,they could tap into every corner of your existence, reset your passwords, lock you out and take over your life.<br><br>It\u2019s that easy and all because you couldn&#8217;t be bothered to use more than one password.<br><br>These tips may seem glaringly obvious, but they\u2019re the simplest ways to ensure your private information does not become public.&nbsp;<br><br>I\u2019ve lost count of the number of times I\u2019ve had to come to my mother\u2019s rescue because she\u2019s opened an email that was clearly part of a phishing campaign.&nbsp;<br><br>Not expecting an invoice from Svetlana in Belarus? Never met a Nigerian prince? Haven\u2019t entered the Bahamas lottery? Well, don\u2019t open the email. You wouldn\u2019t let a stranger into your house so they can rummage through your drawers, so don\u2019t invite them into your devices.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As much as those of us who work in the security industry love the work we do, sometimes you feel like banging your head against a wall. It seems like no matter how frequently or how loudly we try to educate people on basic cyber hygiene, there are still those who go against common sense [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1288,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1287","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=1287"}],"version-history":[{"count":3,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1287\/revisions"}],"predecessor-version":[{"id":3712,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1287\/revisions\/3712"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/1288"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=1287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=1287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=1287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}