Teach you how to prevent cybersecurity top ten threats (1)

  

The Internet is a digital virtual world full of dangers everywhere. Most people who have been exposed to the Internet have been infected by viruses and understand the harms and consequences of the virus. But this does not mean that we have to sit still. By fully understanding the security threats, we can use existing technology and management tools to prevent these security risks. Below, this article will introduce the reader to the common top ten cybersecurity threats, and give corresponding preventive measures:
First, the Internet personal privacy

geese over the traces, the wind over the sound. As long as users have used the Internet, they will inevitably leave some personal privacy. If you don't take steps to avoid it, you will become a "transparent person" on the web.


1

Internet privacy is more concentrated in both cache and history. For caching, if you look at the diagnosis, treatment, etc. of a particular disease on a medical website, you may be guessed about your health status because the information is leaked. Or, if your booking information on the airline website is obtained by others, your travel details will be revealed.

When you access or enter your password or username, many websites will load cookies into your system to improve your browsing experience, but they may also be the first killer to reveal your privacy.

For this reason, some browsers such as Firefox and Safari provide the function of dumping cache. IE 8.0 is also the first browser to provide technical support for user InPrivate private browsing.

Precautions: The safest thing to do, of course, is to make sure your browser is under your control. There are two ways to do this: let the browser save the cache to a personal, secure hard drive, or use a third-party tool to remove some traces of the web surfing in time.

In IE browser, you can do these things in four simple steps: open the Internet Options panel, click the Settings button in the Internet Temporary Folder, and then click the Move folder to your external hard drive. can. To clear the cache, we recommend using Eraser, a great freeware that safely removes cached files and all other history from your browser.

For historical records, it is somewhat similar to what is said above. It is recommended to use a special cleaning tool to erase usage records.

Second, vulnerable to crack the password
surely you remember, last year, the US vice-presidential candidate Salapalin Yahoo e-mail to crack thing. It is not enough to have a strong password. It also requires that the answers you provide for the passwords cannot be easily obtained from the Internet. Otherwise, the hacker can use all kinds of means to let the mail service provider surrender the password.



Now, many of our friends around us have a LinkedIn or Facebook, Twiiter account, and these accounts have a common security issue, such as your pet or middle school. name.

Normally, you can use your chat object or chat information to get an answer to your security question, so it's easier to crack your account password.

Precautions: Use the password manager and make sure you back up your password file. It is recommended to use the Password Safe and PortableApps.com versions of the KeePass Password Safe tool.

Once you have established a random and complex password, you will generate a second password on the password management tool that needs to answer the security question.

Third, phishing attacks
When you receive a message from a large online retailers sent by e-mail, tell them you order goods will be sent, but you can not read sleepwalk, then Try to click on the link that should be directed to the large online store as required. However, the page that appears is not a large online store, but a web-based form pops up, prompting you with an error in your credit card number and password, and asking you to reconfirm or correct the information to proceed to the next step.



If you enter your credit card number and password in accordance with these requirements, the details you provide will fall into the phishing trap and you will become online. Credit card fraud victim.

Similarly, when you receive an email or a pre-recorded voice message from a financial institution, you are notified that there will be a large transaction item - it has not been executed before. Also, there is a toll-free number in the email to contact you to handle the matter.

Copyright © Windows knowledge All Rights Reserved