23.05.2017 Views

CS1705

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

online threats<br />

usual security procedures, for example<br />

giving away passwords, so they can gain<br />

access to the computer. It's as if you hand<br />

over your keys to someone you think is<br />

your best friend - but they're a thief<br />

masquerading as your best friend.<br />

PHISH<br />

Catch your deepest love<br />

Phishing emails are the electronic<br />

equivalent of the 'junk mail' that arrives on<br />

your doormat. These can be dangerous -<br />

posing as a tailored, credible email with<br />

the purpose being to steal financial<br />

information. These emails are designed to<br />

grab your attention, making you drop<br />

your guard, for example, they may include<br />

information on an event you've just<br />

attended. Trust us, it's not a coincidence.<br />

Meanwhile, Emm offers the following top<br />

tips to stay safe online:<br />

Get protected. This may seem obvious,<br />

but security software is the new 'black'.<br />

Its helps you stay fully protected<br />

against malware, spyware, hackers and<br />

identity theft at all times.<br />

Keep up to date. Make sure all your<br />

devices are up to date with all the<br />

latest security and firmware updates.<br />

Practise safe online shopping and<br />

banking. Always shop and bank on a<br />

secure site. Look for a URL that starts<br />

with 'https' and has the lock symbol<br />

when entering your credit card details<br />

or other personal information.<br />

Privacy is key. Avoid using public Wi-Fi<br />

to access any web sites that need a<br />

login and password to access them or<br />

that involves typing in confidential<br />

information.<br />

Socialise safely. By now, we've all had a<br />

bad link or two sent to us over our<br />

favourite social network. Utilise your<br />

social network's security settings to<br />

their optimum level. Do you really<br />

need to display every detail about your<br />

life?<br />

Safe passwords. Use secure passwords<br />

- a different one for each Internet<br />

service. Set passwords to include 12 or<br />

more upper and lower case characters<br />

and numbers.<br />

Stomp out spam. Most Internet Service<br />

Providers and security software<br />

programs have anti-spam<br />

technologies. The spam blocker will<br />

help prevent fraudulent emails from<br />

showing up in your Inbox. Fake lottery<br />

wins or chances to win the latest<br />

gadget can be very tempting!<br />

And if all of this alerts you and your<br />

organisation to be better prepared against<br />

the threats that are escalating all around,<br />

then you would have to say the Kaspersky<br />

campaign could be heaven scent!<br />

BLACKOUT BLUES<br />

Meanwhile, Eugene Kaspersky, founder<br />

and CEO, Kaspersky Lab, has warned that<br />

a blackout such as the one recently<br />

experienced in Ukraine could have deep<br />

and worrying ramifications on a much<br />

wider scale. During a blackout, none of<br />

the devices connected to the lauded<br />

Internet of Things would be able to 'talk'<br />

to each other. "By a cyberattack on critical<br />

infrastructure taking control of a country's<br />

power grid, simply nothing would work,"<br />

he warns. "No urban facilities, no water,<br />

no air conditioning, no elevators, no<br />

Internet, no mobile network.<br />

Far-fetched sci-fi? "Unfortunately, this<br />

scenario is very real," he adds. "The world<br />

we live in is based upon technologies and<br />

ideas which were made 50 years ago.<br />

Many of them rely upon an architecture<br />

that predates the era of cybercrime. The<br />

hackers simply didn't exist then. As we<br />

increasingly depend on technology as the<br />

backbone of our civilisation, we need to<br />

ensure our critical infrastructure is built<br />

upon a robust architecture that is not only<br />

secure, but immune. If we don't adopt a<br />

security-first approach, we will face a very<br />

uncertain future."<br />

Eugene Kaspersky: without a security-first<br />

approach, we will face a very uncertain<br />

future.<br />

David Emm: fear is all around us in our<br />

connected lives.<br />

www.computingsecurity.co.uk @CSMagAndAwards May/June 2017 computing security<br />

33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!