Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    10 Online Security Measures Everyone Should Implement in 2018

    Written by

    Robert Lemos
    Published February 16, 2018
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      In mid-2017, attackers breached Equifax, stealing personal information on 143 million people and marking the end of an era. With sensitive information on more than half of all U.S. adults compromised by online attackers, people should no longer assume that their information is private. 

      In fact, consumers and workers should assume that their information is in the hands of cyber-criminals. Not only do companies rely on the information as an identity test, but massive amounts of personal data can give attackers unprecedented insight into victims. 

      For that reason, consumers need to pay more attention to their digital lives, David Britton, Global Vice President, Industry Solutions, Fraud and Identity at Experian. 

      “Remember that all of the data about you as a person—meaning your name, your address, your phone number, your Facebook username, and everything else—all of that data has value,” Britton said. “We often forget that as consumers, and if we think about that data having value, it should give us pause whenever we are putting that data out there.” 

      While many companies collect data on consumers—often without people knowing the extent of their knowledge—consumers do have options to keep their data more private and secure. 

      1. Protect your devices against attack: Update regularly 

      After computer vulnerabilities are publicly released, attackers are quick to exploit them in cyber-attacks, especially if a proof-of-concept exploit or similar information is made public. In a study of the vulnerabilities patched over a six-month period, Microsoft found that about 8 percent of all vulnerabilities are exploited within 30 days.

       

      The low exploitation level speaks to the increasing costs to attackers of finding and exploiting vulnerabilities in modern software. However, for users, the danger is much more significant. Exploits were released for vulnerabilities in four of the six months studied, so consumers should expect to be vulnerable nearly two-thirds of the time. 

      Software updates are important, said Marty P. Kamden, chief marketing officer for NordVPN, an encrypted network service. 

      “Many devices have … vulnerabilities that could also be used to exploit a device and steal personal data,” he said. “The only way to avoid these flaws is to update your device whenever newest patches are released.” 

      2. Sign up for important accounts, before attackers do 

      In the past, consumers could avoid taking part in the digital world and lead a private offline life. That’s no longer true. 

      The most important data—tax filings, credit-card transactions, health data, and personal information—are all online. To best protect that information, the consumer needs to be online as well, Experian’s Britton said. 

      “Even consumers that have no online presence, their data has been digitized,” he said. “My recommendation is to sign up for the online version of your bank account, sign up for the online version of your credit card, because if you don’t, it’s possible that a fraudster might get your information and sign up on your behalf and then they have control of the digital channel.” 

      By signing up for the online version of any important accounts, consumers also get an additional way of detecting fraud. Most financial institutions have an alerting mechanism to notify users of suspicious activity or transactions. Such alerting, along with regularly checking balances, can be the best way to detect fraud before it impacts your finances. 

      3. Beware of social media, leaky apps 

      While users should worry about attackers stealing their data and accounts, they also have to make sure that they do not compromise their own security and privacy by posting too much information online. Many people innocuously put their birthdays, maiden names, children’s names, and other information online that could be used by attackers to gain access to accounts or make a more compelling phishing scam to fool the user. 

      “Always think before you put that data out there,” Experian’s Britton said. “Check what you are posting online, frankly. And know that any service that is a free service is using your information and the data to create a product.” 

      Likewise, users should be careful about the apps that they use, because malicious or negligent developers may release software that harvests or leaks information. While numerous malicious apps have been discovered and removed from major app stores, smaller app stores generally do not have the security measures in place to detect intentionally malicious software. Exclusively downloading apps from the major app stores can help users remain safe. 

      4. Use a password manager 

      Passwords pose a number of security issues for most users. Strong passwords are typically complex and hard to remember, which means that most users create flawed and easily broken passwords, or create just a few strong passwords and reuse them. 

      Reuse, however, is a major problem. Third-party sites and services are often compromised, and if that company did not adequately protect its users’ passwords, the attacker can attempt to use the passwords on other sites as well. Unique passwords will not give them any advantage, but a reused password is weak no matter how uncrackable the original password is. 

      Password managers allow their users to have unique, strong passwords for every site, with a single strong password that unlocks the password vault. They are also much easier to use and better integrated, said Fatemeh Khatibloo, principal analyst for privacy at Forrester Research. 

      “The password management apps have done a really great job at improving their user experiences,” she said. “It is absolutely something that everyone be using.” 

      5. Go beyond passwords: Multi-factor authentication 

      While password managers allow users to create a unique password for every site, a single secret is not enough to protect access to critical information. Any compromise of the password will give the attacker complete access to and control over the user’s information. 

      A variety of additional security measures are often offered by service providers—from one-time password (OTP) mobile apps to hardware keys to fingerprint identification, such as Touch ID—and users should adopt them, advised Forrester’s Khatibloo. 

      “People think two-factor authentication is going to be more a of pain in the butt than it really is,” she said. “It is a great way to prevent account takeover.” 

      6. Ad blocking adds security 

      Online advertising is a chaotic ecosystem that involves numerous players, from advertisers and ad networks to publishers and marketplaces. The sheer number of players and the lack of visibility into who is the ultimate advertiser allows attackers to create malicious advertisements—so-called malvertising—that can be hosted on popular sites. 

      For this reason, ad blockers have become an important security measure. In the past, ad blockers were about user dissatisfaction with increasingly intrusive advertisements. With attacks coming through the advertising channel, however, blocking ads is increasingly about safety, said Forrester’s Khatibloo. 

      “Meltdown and Spectre—the latest significant vulnerabilities—they are piggybacking on scripts that are running on ad servers,” she said. “So ad-blocking is now a security and privacy precaution as opposed to ‘I want to improve my Internet browsing experience.'” 

      Until advertisers can ensure that advertising channels are free of malware, ad blockers are a good way to protect your system from a malvertising attack. 

      7. When on a public network, use protection 

      With each individual using a proliferation of devices, many do not consider the networks they use to communicate. Hotel networks and free WiFi in coffee shops, for example, could allow an attacker to perform a man-in-the-middle attack and intercept a user’s data. 

      Corporate or personal virtual private networks (VPNs) are a good way to protect data. Yet, for non-technical people, they remain intimidating or, at the very least, too troublesome. 

      “It is a step beyond what most people want to do,” said Forrester’s Khatibloo. 

      She recommends that all users considering forcing their browser to use HTTPS, the secure form of the Web protocol. However, doing so can cause issues with websites that don’t support the protocol. 

      Another way of protecting your communications is to not use the public network at all, but to use a hotspot through your phone. While not foolproof, intercepting such communications is more difficult. 

      “People often forget that (using a hotspot) is a great way to ensure that your laptop or iPad is secure,” she said. 

      8. Encrypted e-mail keeps archived information secure 

      Most people give little thought to the selection of an email provider. Using one of the large cloud email services can undermine a user’s privacy, however, because companies offer the free service as a way to target the user with unwanted advertising. 

      Yet other options exist. ProtonMail, for example, is a free encrypted email service provider based in Switzerland and developed by researchers from CERN that allows users to sign up without providing personal information. 

      Such details are what protects users’ privacy, said NordVPN’s Kamden. “[E]ven the provider itself cannot decrypt and read subscribers’ emails,” he said. 

      9. Stop throwing data in the trash 

      While the heyday of dumpster diving may have passed with the transition to digital documents, companies and individuals should consider their trash to be a potential threat. Many companies still do not require that paper files be regularly shredded or incinerated, Forrester’s Khatibloo said. 

      “We have forgotten how important shredders are,” she said. “I’m shocked at the large file folders of things that I see thrown away in our dumpster every day.” 

      Other physical security measures that users should consider are privacy screens for their devices and even RFID wallets for any ID cards. 

      10. A credit freeze can help most people

      Since the breach at Equifax, privacy advocates have urged consumers to put a credit freeze on their account with all the major credit firms. While doing so requires some effort—and requires that the consumer remove the freeze if they want to open an account—a freeze will prevent the most pernicious form of fraud: new account fraud. 

      “Credit freeze is absolutely is a great way to go,” said Experian’s Britton. “It allows you to put a block on your account so that no one can open a credit product in your name.” 

      Britton also recommends that consumer check out their credit report at each of the consumer information companies, which they are entitled to receive for free annually. Businesses that rely on credit information will have to do more to ensure that they are dealing with the legitimate account holder, he said. 

      “The truth is that since 2013, the [amount] of breach activity is so large, we assume that everyone’s persona, everyone’s identity data has been compromised. Full stop,” he said.

      Robert Lemos
      Robert Lemos
      Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×