3 Killer Cybersecurity Tips that Protect and Save

This story began as a Father’s Day post. As I researched, I realized that cybersecurity should be on everyone’s task list. Mine, yours, and our parents and grandparents.

Every day there is a cybersecurity incident. Not once in a while, every day. These occurrences we read in the news affect everyone from businesses and their workers to everyday people like you and me everywhere in the world. The effects can be direct or indirect, trickled down from the original incident.

What are you doing to keep your information safe?

Email

Source: Image by Mohamed Hassan from Pixabay

Email is universal, and over a billion people everywhere use it. Besides, it has become a significant vulnerability to organizations and their workers. Cybersecurity criminals rely on email as an entry point to access other larger payloads.

These hackers have a singular goal; they want to steal your passwords, account numbers, or Social Security numbers. These can provide access to your email, bank, or other accounts.

These scammers execute many phishing attacks every day — and are frequently successful.

Key things to watch out for in your email include:

  • Emails that appear to be from a business you know

Look for slight differences in the email address or domain. Contact the company directly and ask if they sent out an email.

  • Emails that attempt to lure you by telling a story to get you to click on a link

Here are some examples:

  1. Often from a financial institution like a bank, credit card company, or payment website such as PayPal, these emails say they’ve noticed some suspicious activity or log-in attempts
  2. A claim that there’s a problem with your account or your payment information
  3. A request that you must confirm personal information
  4. An attached/linked to a fake invoice, such as one claiming to be from Norton or McAfee, and the invoice for hundreds of dollars.
  5. This one is very like the above, and they want you to make a payment and provide a link to a site
  6. They say you’re entitled to a government refund and ask you to register
  7. Offer free stuff coupons

Want to see an example IRL? Here’s one:

At first look, this might look real, but it’s not. Phishing emails like this one have real consequences for victims who provide the information to the hackers. Moreover, these emails harm the reputations of the companies they impersonate.

So, how can you protect yourself?

Passwords

Having secure passwords is essential for everyone.

Hackers can crack passwords under six digits in seconds using brute force (automated trial and error.)

This chart emphasizes how fast it can happen based on length and complexity. Those easy-to-remember passwords our parents love that consist of children or pet names? Trivial to crack.

A typical challenge in remembering many different passwords needed to access email and other accounts is challenging for some people. While this affects aging adults more profoundly, it’s also a problem for others. Luckily, there is a solution to this.

Password Managers

More recently, the development of applications like password managers has helped with this problem. Although password managers began as the built-in ones we know in Chrome, Edge, and other browsers, Password Managers have evolved.

I recommend using one of these secure password managers as they are made to keep your information private, and are typically better than the browser-based ones.

These cloud-based security apps can store complex and unique auto-generated passwords for every account until needed.

Multifactor Authentication (MFA)

You know you’ve heard/seen this term around. Many accounts offer extra security by requiring two or more credentials to log in.

Sometimes this is called two-factor authentication, and other times it is called multi-factor authentication. Under either name, it’s essential to have it enabled on every account.

The extra credentials you need to log in to your account fall into two categories:

Something you have:

  1. A mobile number or
  2. An authentication app like LastPass, Dash Lane, Microsoft, or Google.

Something you are:

  1. Biometric information such as a Fingerprint, Face ID, or Retina scan.

Multifactor authentication makes it more difficult for hackers to break into an account. According to Infosecurity Magazine, it prevents 90% of attacks from being successful.

Online Shopping Scams

Source: Image by Mohamed Hassan from Pixabay

A new con on the scene and is dependent on the popularity of online shopping enlists bogus websites that put charges on your card but don’t complete the delivery of your order.

For consumers of all ages, it’s normal to use Google to find the lowest price on a product you want to buy. Google Shopping conveniently pulls shopping listings for all the companies who stock the product sought for purchase and can filter the options by relevance or price.

Another facet of this scam by cybercriminals involves websites propped up that include catchy names based on Web 2.0 trends. These websites will contain the product you’re looking for, claim it’s in stock, and offer free shipping — but the price will be too fantastic to be believed. An offer like this will tempt the most cautious shopper to be careless with their security to get the deal.

Because the SEO of these sites is done well, Google picks them up next to real sites

But don’t be fooled; these sites have everything needed to charge a payment to your card, but don’t hold your breath waiting for the delivery. They never complete the order. Some of them may be picked up by the hosting company and shut down. But others pop up in their place blazingly fast.

What Are the Warning Signs?

There are a few tell-tale signs of fake e-commerce sites. These signs include:

  • domain names that are newly registered (verify on https://who.is or similar sites)
  • these fakes use platforms like Shopify just like real e-commerce sites
  • contact information on the site owner is missing or challenging to find

They speedily move the money they get from credit card charges to avoid bank chargebacks.

Tech Support Scams

Source: Photo by Kevin Ku on Unsplash

Scammers often pretend they’re from tech support at well-known companies, like Microsoft, Dell, or Apple. They expect you to open an email, text, or pop-up if you see a familiar name.

They may also try calling you, hoping you’ll react to an “urgent problem” with your computer. That’s how they get your personal information or money to “fix” it.

They will offer to connect via remote desktop to fix the problem. Later you’ll find that your computer that was working has suddenly stopped. Meanwhile, you’ve let a stranger access your device and personal information.

They want you to pay for tech support you don’t need, fix a problem that doesn’t exist, or create one for you.

Here’s what you should do:

  • If you receive a call from someone you don’t know who says there’s a problem with your computer, disconnect the call and block the number. It’s a scam.
  • Don’t click any links in unknown emails or messages. Never call phone numbers left in emails, voicemails, social media messages, or texts.
  • Never give your personal or financial information in response to an unexpected request. Genuine companies won’t ask for your Social Security, bank account number, credit card, or password in a message or call.
  • Update your computer’s security software. If you suspect a computer problem, run a security scan. This will locate and remove malware or viruses. Enable automatic updates. These will keep your security software up-to-date, protecting you against new security threats.

Final Thoughts

We live in a continually changing world where the cybersecurity landscape is more threatening at every turn of the globe. Take every precaution to keep your data safe.

Check out my article How to Leverage Amazing SEO Content Writing Methods to Boost Your SERPs

--

--

Lori Imdad | Cybersecurity Tech Content Writer

I am a former IT analyst turned tech content writer focused on cybersecurity for tech businesses. Say hi loriwritescyber@gmail.com.