Sunday 30 April 2017

Protecting yourself from the top three online security threats

Whether you are banking online or simply surfing the Web, learn how you can protect yourself, your computer, your identity and your company's information against these common online security threats:

Computer Viruses, Worms and Trojans
Identity Theft
Data Theft
Report suspicious email, phishing or identity theft

PROTECTING YOU FROM ONLINE FRAUD


As perpetrators of fraud become more sophisticated, CitiBusiness. Online is committed to being more diligent than ever in helping to prevent fraud before it can occur. That is why we utilize two-factor authentication to give our customers added protection.

YOUR BEST DEFENSE AGAINST ONLINE FRAUD


Security updates, patches or service packs. Most software providers release fixes on a regular or as needed basis.

Protect Yourself: Sign up for alerts on key provider Web sites, and install patches as soon as they are available.

Anti-virus software. These programs detect viruses that can be delivered by e-mails and other incoming attachments and that spread from computer to computer. Anti-virus software can scan incoming files to look for known viruses, or can flag suspicious behavior from a computer program that might indicate it's been infected.

Protect Yourself: Install anti-virus software on your computer and update it regularly.

Anti-spyware software. This type of software protects your computer from programs that track your Web browsing habits or that can make changes to your computer settings without your knowledge. Most programs detect and remove spyware, as well as scan incoming files to prevent spyware from being installed.

Protect Yourself: Install anti-spyware software on your computer and update it regularly.

Personal firewalls. A software program that monitors communications to and from your computer, a personal firewall allows you to designate what application can connect to the internet. It can alert you when a connection is attempted or can be set to automatically block connectivity.

Protect Yourself: Install a personal firewall on your computer and then use an online testing service to ensure it is working correctly.

Layers of Security. Internet security experts agree that layers of security are the best defense against online threats. As such, it is important to use all the tools available to you. Anti-virus software, anti-spyware software and personal firewalls should all be used in conjunction with one another to provide an enhanced level of protection. In addition, you should regularly check provider Web sites for updates, patches, or service packs to combat against new viruses, spy-ware programs and fraud techniques.

COMPUTER VIRUSES, WORMS, AND TROJANS


A computer virus is a self-replicating program that spreads by attaching itself to documents or other executable files. Viruses typically spread from computer to computer by e-mail. Once it finds a host, a virus will execute malicious code designed to disrupt or stop a computer from functioning.

A worm, like a virus, self-replicates in order to spread malicious code from computer to computer. While a virus typically depends on someone to send it in an email, once established, worms can create their own emails and send themselves.

A trojan, also known as a Trojan horse, is a program that appears to be legitimate or desirable software but is in fact, a vehicle for malicious code. Trojans are spread as the software they reside in is shared and installed. Once triggered, a Trojan horse can cause loss or theft of data.

Protect Yourself Against Viruses, Worms and Trojans
Install anti-virus software and check for updates regularly
Download security updates, patches, or service packs from your software provider
Configure e-mail accounts and virus protection software to block junk e-mail
Do not open e-mails from unknown senders
Do not open attachments you are not expecting even if they appear to come from someone you know, and especially if attachments have file extensions such as .exe, .pif or .vbs

IDENTITY THEFT


Social engineering refers to the act of tricking people into providing confidential information. While many social engineers do use the Internet to obtain information, the practice focuses primarily on taking advantage of human trust as opposed to any vulnerability in a computer's security.

Phishing is a form of social engineering that targets individuals by e-mail, posing as a legitimate business, and asking them to provide information such as User IDs, passwords or credit card information.

Keylogging is a common method for stealing passwords for any number of programs or Web sites. A software program is installed on your computer, without your knowledge, that logs your keystrokes as you type and sends data back to a fraudster - making it easy for them to access personal and financial data.

Spoofing is the practice of setting up a Web site that parodies a legitimate site for the specific purpose of deceiving people into providing confidential information. These sites are typically accessed by an embedded link in an e-mail, and often request User IDs, passwords, or credit card information.

Protect Yourself Against Identity Theft
Install anti-spyware software and check for updates regularly
Use personal firewalls
Keep your User ID and passwords safe - don't share them with anyone and don't write them down
Change your password regularly
When setting a password, don't use easily guessed phrases like children's or pet's names and try mixing numbers, letters and symbols
Don't follow embedded links in e-mails since they can take you to a spoofed site - instead type the trusted web address or use a Web address saved in your Favorites or History to access a site, especially a banking site
Leave suspicious Web sites immediately, and never enter sensitive information without first confirming the validity of the site and request
Never send sensitive information by e-mail
Password protect your computer, and shut down your computer when not in use
For more information please read "Beware of Fraudulent E-mail," which can be accessed from www.citibusinessonline.com.

DATA THEFT


Similar to identity theft, data theft more specifically targets sensitive financial and personnel information within a corporation. Many of the same techniques for gaining access to information apply here as well, including phishing and keylogging.

citi business online banking, citibusiness online access, citibusiness online token
Source: http://docphy.com/business-industry/online/protecting-top-three-online-security-threats.html

No comments:

Post a Comment