Page 48 - index
P. 48
Are you using at least one popular web browser like Google Chrome or Mozilla Firefox?
99% of users will say YES.
"What does that mean for me?” you may ask.
By using security holes in unpatched applications, cyber criminals manage to spread exploits
that deliver financial and data stealing malware on the affected systems. For this reason, you
always need to have the latest security patches available and this can only be done by using
a free solution that does this automatically for you.
5. Use a password manager for your credentials
It is easy to subscribe to a great number of online accounts and forget what passwords you
have set. To avoid this issue, most people simply choose using only one or two passwords all
the time.
But, this is exactly what hackers count on!
That’s because not all these online accounts incorporate high security standards to protect our
password. And if they break just one account and find out your password, they can simply use it
on all the other online locations.
Remember lesson 5? I hope you’ve already applied the steps there, so that you can check this
off and move on to the next thing!
6. Back-up your system and sensitive information
If you ask security experts their best advice on how to keep sensitive information secure from
cyber-criminals, most of them will tell you that a back-up solution is the best option you have.
So, even if your system is blocked by ransomware that stops you from accessing it, you can
format the system and use your backup to be back on track.
You can use one of the available back-up solutions available or you can keep most important
data in the cloud and access it from any location and any device. Back-up solutions coming your
way in lesson 9!
7. Maximize your data and financial protection
These security products are designed to detect online threats that normal antivirus products
can’t remove, like Zero Day attacks that a traditional signature based antivirus is not able to
block from infecting your system.
48 Cyber Warnings E-Magazine – August 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide