Public Wi-Fi connections present significant threats to their users. Hackers use a variety of software to create a connection that mimics the Wi-Fi connection of the hotel, restaurant or hostel. When users try to access it, they are infected with EternalBlue, which gives hackers access to the users’ details. Below is a guide on how small business and the general public can identify and protect themselves from malicious internet connections.
Enroll in a CyberSAFE Training Class
Training is one sure way of ensuring cyber security in business. Companies should make sure that they attend the regular classes of CyberSAFE to make sure that all employees are aware of the new tricks used by hackers. The cyber security issue is not limited to businesses only; individuals should as well feel free to attend CyberSAFE training programs to avoid from falling victims of the witty hackers.
Keep Software Updated
Hackers will find a weak link in the software used by individuals or companies. Updating all the software can fix such vulnerabilities. Software firms create updates that can easily fix these vulnerabilities. Additionally, it is also essential to back up critical data. Back up enables data and file retrieval in an event where data has been lost. Information should be backed up at a different location to prevent hackers from accessing all the data.
Secure the Wi-Fi Network
Organizations and individuals with workplace or home Wi-Fi connection should ensure that it is secure, encrypted and hidden. To make sure that the internet connection is hidden, set up a wireless access point (service set identifier) such that it doesn’t broadcast the network name. Set a password to protect access to the wireless access point.
Choose Strong Passwords
The easiest way to a cyber breach is through passwords. If hackers know individual or company password, they have a simple time accessing all the information. Passwords such as 1234 are guessable. People should choose passwords that mean something significant to them, but unknown to others.
Ensure that the passwords set are easy to remember. In an event where passwords are written down, they should never be left in plain sight. Ensure that they are not kept on the computer desk. Individuals and enterprises should avoid using the same passwords for multiple accounts. It is also wise to change passwords after a few months.
Verify the Connection
Hackers might alter the name of the internet connection by a single letter. Unknowingly, people log in using the malicious connection developed by the hackers. (ie. McDonalds-Guest might be McDonaldsGuest) To avoid this, individuals and employees using shared connection should confirm the name of the connection from the relevant authority within the premises.
Beware Of Phishing Scams
Phishing emails are messages that appear from legal organizations such as banks and stores. They provide fake links to fake websites and ask for personal information. In such a scenario, keenly observe the email address. In most cases, the sender email address doesn’t match the email of the organization they claim to represent.
Avoid phishing email scams claiming to be from a bank or any other company trustworthy organization. All suspicious e-mails should be forwarded to the organization it claims to be sent from. They will always confirm if it is real or malicious. E-mail programs never ask for passwords, so don’t fall a victim.
Limit the Information Shared On Social Media
Many people especially women post their maiden names, parent names, birthdays, home address, cell phone numbers and other sensitive information. This information gives stalkers plenty of information to use.
Many secure sites especially the banking, insurance and school websites ask questions such as mother’s maiden name, child’s birthday, and many other related questions. All these information can be found on Facebook pages of many people who end up being victims of cyber attacks.
Conclusion
With the increase in data breaches, cyber security is becoming a top priority for businesses and some individuals. Hackers are evolving improving their capability day after day. It is, therefore, essential to get a CyberSAFE training to protect crucial information from leaking.
Sources
https://www.fcc.gov/general/cybersecurity-small-business
http://www.hoparoundtheworld.com/step-6/internet-cafe-safety.php
Looking to make your Company CyberAWARE?
Get hooked into Corporate Training!