Posts

Showing posts from February, 2018

DDOS

A distributed-denial-of-service, or DDoS, attack is the bombardment of simultaneous data requests to a central server. The attacker generates these requests from multiple compromised systems. In doing so, the attacker hopes to exhaust the target’s Internet bandwidth and RAM. The ultimate goal is to crash the target’s system and disrupt its business. Why would someone carry out a DDoS attack? An attacker may use a DDoS attack to extort a business for money. DDoS attacks can also provide advantages to business competitors or political benefits to governments or “hacktivists.” The failure of a company’s network can benefit many people. How long can a DDoS attack last? The length of a DDoS attack varies. Attacks like the Ping of Death can be quick. The Slowloris attack takes longer to develop. According to a  Radware report , 33 percent of DDoS attacks last an hour, 60 percent last less than a full day, and 15 percent last as long as a month. What does DDoS protection do?...

Understanding firewall

What do firewalls do? Firewalls provide protection against outside attackers by shielding your computer or network from malicious or unnecessary network traffic and preventing malicious software from accessing the network. Firewalls can be configured to block data from certain locations or applications while allowing relevant and necessary data through. (See  Understanding Denial-of-Service Attacks  and  Understanding Hidden Threats: Rootkits and Botnets  for more information.) What type of firewall is best? There are various types of firewalls with differences in where they are located and what types of activity they control. Firewalls may be broadly categorized as hardware or software. While both have their advantages and disadvantages, the decision to use a firewall is far more important than deciding which type you use. Hardware  – Typically called network firewalls, these external devices are positioned between your computer and the Internet (or o...

Beware of all this...(Cyber security)

Image
 Don’t be lazy, stop saving your card details Stop saving your card details on your online accounts. Don’t save them for your cloud provider, don’t save them for your favorite ecommerce retailer, don’t save them anywhere . No cards saved on any account, no matter how small or insignificant or secure you might consider it. If you want to buy something online, take your time and fill in the credit card details  every single time . Yes, it’s a pain in the… fingertips. But it’s worth it to lose 30 seconds and do this manually each time you want to buy something. The lazy alternative also comes with a high risk of card fraud . You can never know who manages to breach your account (no matter who’s at fault for it) and end up using your card.  Beware of adware Adware  is a type of software that delivers ads on your system. Usually, these pop-up ads appear like annoying pop-up ads or banners while visiting websites. And they can also slow down your com...

Cyber security tips for social media users

Image
SOCIAL MEDIA 1.  Speaking of leaving your front door unlocked, think twice before checking in on Facebook. Sure, you want to tell your 362 friends you’re off to Spain for two weeks but at the same time you’re also saying  “Hey everyone I won’t be in the country for a fortnight, so feel free to pop around to my empty house!”. 2.  One of people’s biggest downfalls when it comes to cyber security is social media. ALWAYS review everything before you post it. Does it contain any personal information? If your social media post does involve personal information, delete it. 3.  Do your social media accounts need to be public? Most social media platforms come with an option to make your account private letting you filter through friends and follow requests. Never accept a request off somebody you don’t know. 4.  By far the most popular social media platform is Facebook but do you know about its login alerts? When your account gets accessed from a new device, ...

Cyber security tips for businesses.

Here are some ways to minimize business-related cyber risk before it’s too late. Install antivirus on all systems  – Even if your workers use their own devices (smartphones and laptops), the investment is minimal to have peace of mind that your communications, files and private information are not being bugged. Mask employees’ location  – Encourage workers to download a VPN service for use during business travels. This additional small fee could save you from paying a big price down the road. Enforce a company-wide policy  – Devise and enforce corporate guidelines for password security, website restrictions (if need be) and getting everyone on board with realizing the serious implications if a data breach were to happen. Continue to remind your team of security tips in company communications, including newsletters, intranet, emails, bathrooms and break rooms. Keep the internet secure  – Secure your company’s internet by actively using a password secu...

Cyber Security Tips for Students and there parents

Cyber security should start at a young age. Kids are using cell phones, playing video games, streaming music, paying for things with credit cards and engaging with smart technology as young as toddlers (and they are just as susceptible as their parents). In fact, the   National Cyber Security Alliance (NCSA) reports that   kids ages 8-18 spend 7 hours and 38 minutes per day online . That’s nearly 1/3 of their day! This is why it’s vital for younger generations to stay informed and guarded against digital dangers as well. Get them started on the right foot  – Before unboxing or passing down a device to them, set it up with all the security settings and parental controls to ensure they aren’t opening up a can of worms when they power up. Even playing field for parents and kids  – Share that the adults are following the same rules. This will make them feel they are not being punished or called out for having to adhere to special guidelines. Think before you clic...