Page 49 - index
P. 49







Most of the time, these solutions target financial information from the system, like credit
card and pin numbers or personal data that we employ on online banking accounts.

In order to get protection against data stealing malware, the solution you need should:

• include a real-time Internet traffic scanner that scans all incoming network data for
potential malware threats

• provide malware detection and removal of malicious code from a system

• contain online scanning capabilities that detect malicious software from online pages
and legitimate websites


To assure financial security for banking operations and protection against zero day malware,
you need an advanced scanning technology that can protect you from the latest threats.



8. Encrypt your important files

By encrypting your personal information you make sure cybercriminals can’t access your
confidential data, even if they gain access to your operating system.

You can choose to encrypt files on your local disk or you can choose an online location, which
makes things more difficult for any hacker.
Since this is a long topic, I recommend that you think about encryption as an important part
of your online security strategy.


For example, you can use an encryption program for your files, but how useful can it be if your
password for the program is not that strong?

Think about encryption as an important part of your online security strategy. And check your
inbox for lesson 9 a little down the road for a list of tools you can use.



9. Protect your online traffic by using multiple tools

How do you keep your system safe from online threats?

It is the same question I started this article with, but are we closer to the answer?


To improve your online protection, you cannot rely on a single solution, but you rather need to
understand that multiple means and guidelines need to be followed:

Let’s start with the browser. Are you using the latest version that contains all the available
security patches?

49 Cyber Warnings E-Magazine – August 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   44   45   46   47   48   49   50   51   52   53   54