Full Show Notes:
Cybersecurity and Data Protection
The past decade or so has witnessed an increase in the number of things we can do online. And with the global pandemic pushing us into the virtual world, cybersecurity is a topic that we felt is crucial in current times. Cybersecurity and data protection is simply keeping your private information protected and safe from damage and theft. According to recent research, most organizations have or will be faced with a cyber-attack throughout their existence. The fact that these organizations pump millions of dollars into boosting their security protocols, yet they still face threats is worrying because imagine what these hackers can do to an individual with limited resources. The good news is, there are simple steps that you can incorporate into the online space that will protect you from potential threats, and we’re here to guide you throughout the entire process.
Create Passwords and Make Them Strong
The most basic way to protect yourself from cyberattacks is by having passwords. Even with face recognition software and fingerprint scanners on most of our devices, most people are still reluctant to sign up for them. But, what happens when you lose that device, say your computer, and someone gains access? Remember, your machine doesn’t have a password, and most browsers have a password autosave feature, which, theoretically, means someone can access all your private information. That said, always ensure your devices have passwords that are at least 12 characters long and include numbers, letters, and symbols. The other thing is being cautious when using public computers or public networks such as your library or coffee shop WiFi.
Think Before You Act
The common and most notable trick that most scammers use is creating a sense of urgency through emails claiming a problem with your bank account or taxes. Once you provide them with your information, what happens next is that they use your information to either steal from you or target your network. How then do you differentiate authentic from fake emails when they all look all so similar. First, most financial institutions use verified emails and rarely ask for your information via email. Secondly, if you’re unsure whether the source can be trusted, always seek a second opinion, even if it means calling your bank.
Adjust Your Privacy Settings
As earlier mentioned, hackers can be quite convincing when reaching out asking for your personal information. They do this by monitoring your digital footprint, a good example being how you use your social media. Let’s say you were on holiday in Rome and posted on social media how wonderful Rome is and tagged the hotel that accommodated you. When sending you an email, these scammers will mention everything you did in Rome, making them sound legit. So, before posting anything on social media, make sure you filter out people that can view your content. Again, if an email looks weird, delete it. If it’s important, your bank should call you or contact you via mail.
Remember to Log Out
Forgetting to log out, especially from public devices, has been in existence ever since computers were first invented. At first, random people would access your account and play a prank on your contact list. Over time, these pranks have transitioned into identity theft and extortions. This, again, goes back to having strong passwords and avoiding public networks and devices unless it’s necessary. This ensures that if you fail to log out on your device, the only way someone can access your information is if they get a hold of your device. But then again, your device will have a password, which is a guaranteed safety feature.
Security Software Scam
Another common way scammers can access your information is by again, preying on your sense of urgency. Once you visit an untrusted site, you’ll see a pop-up that tells you that your computer is at risk and that you should install specific software to eliminate the risk. If you fall into the trap and install the said software, they’ll have free access to your personal files and information.
Scammers understand that people can be greedy sometimes and so they’ll send you an email claiming that you won a million-dollar lottery that required no participation. The next thing they’ll ask you is to provide your bank details or credit card information so that they can disburse the winnings. Here’s the thing, there is no way you can possibly win a lottery without participating in one. It just can’t happen.