KNOW YOUR RISK AND APPLY SECURITY

  • Operating system (OS) updates frequently include security patches that fix vulnerabilities in the operating system (OS). These vulnerabilities can be exploited by hackers, who use them to gain access to personal information on your device or even execute malware that can damage your computer or steal your data.

  • Installing operating system updates can help keep you safe from these attacks by patching the vulnerabilities so they cannot be used against you. In addition to providing protection against hacking attempts and malware, regularly updating your operating system helps maintain the speed and performance of your devices.

  • Operating systems are constantly being improved upon, which means that new versions include improvements in performance and speed over previous versions. Without installing these updates, you could be missing out on valuable improvements that could make using your devices more enjoyable.

KNOWING WHAT INFORMATION YOUR DEVICE CONTAINS IS THE STEP TO PROTECTION.

The amount of information that your device contains is the step to protection. The more information that is on your device, the more likely it is that someone will be able to access it. If you have sensitive information on your mobile device, you should consider encrypting.
Once it's no longer needed, get rid of it.

HOW MANY OF THE ITEMS LISTED BELOW DO YOU HAVE ON YOUR DEVICE?

  • Deleted Files
  • Text Messages
  • Phone Calls
  • Names & Addresses
  • Passwords
  • Social security number (SSN)
  • Credit card numbers
  • Bank account information
  • Medical records
  • Recent files
  • Contacts
  • Photos
  • Current location
  • Recently visited sites
  • Recent locations

CAN THESE ANSWERS BE FOUND ON YOUR SOCIAL MEDIA?

  • What high school did you attend?
  • What is your dog’s name?
  • What is your favorite book?
  • What is your dream job?
  • What is your mother’s maiden name?
  • What city did you grow up in?

Typically, people are honest when filling out security questions.
To be safe online is to not be honest when filling out these questions. Treat security questions as another password field.

THE TRUTH BEHIND FREE VPN PROVIDERS

  • People nowadays typically consider their smartphone to be their primary 'personal computer'. Mobile internet usage surpassed desktop usage last year.
  • Those wanting greater online privacy frequentlyto installa VPN on their device, hoping that their entire online activity would be hidden. However, there is a concern because it is sometimes unclearhow secure their data will be.
  • Free VPN downloads, both desktop and mobile, are perhaps the worst culprits in this regard, since they use the data passed through them for analysis, ad targeting, and possible sale to third parties.

SOME RISKS TO FREE VPN DOWNLOADS ARE:

  • A VPN may decrease your speed
  • You risk being blocked by certain services
  • Your online activities
  • Your bandwidth
  • Your personal data
  • If it’s free, then you are the product

CAN YOUR PHONE BE HACKED WHILE CHARGING?

Bad actors install malicious device to a public charging station in order to steal data or infect a victim's device with malware.

WHAT CAN YOU DO TO PREVENT THIS?

  • Always carry power bank.
  • Switch off handset before recharging in public ifyou absolutely must use a public charger.
  • Buy a data disabled charger cable.
  • Don't use charging cords you don't know are safe, and don't connect your device to a computer or other device you don't trust.
  • When possible, avoid utilizing public charging stations.

HOW TO TELL IF YOUR SMARTPHONE HAS BEEN HACKED

  • Your phone runs very hot
  • The presence of unrecognized apps and data
  • Unwanted or hidden apps running on your phone can lead to spikes in data usage
  • Your previously set passwords are not accepted, which means the attacker remotely controlling your device
  • Performance of your device than usual, making it harder to operate apps and load

HOW YOUR PHONE CAN BE HACKED

There are many ways that cybercriminals can use to hack your phone. Some don’t even require advanced technology.

  • SIM Swapping

By using this attack, cybercriminals can transfer your phone number to their own SIM card and take over your accounts.

This is software that allows cyber criminals to capture carrier PIN, email 2FA, OTP code and capture personal details from the victims.

How OTP BOT works:

Bad actor gives the victim’s information to the bot, the bot calls the victim and asks for account OTP that was requestby the bad actor, and the victim enters account OTP via phone then the bot distracts the victim with a message while his or her account getting compromised by the bad actor.

  • Spyware

This software collects your data. Some spy apps are pretty easy to get hold of and can be used by a person without advanced IT knowledge. This lets them remotely monitor your phone activities. A person can install such an app by getting a direct access to your device.

  • Public Wi-Fi

You might get a malware via public Wi-Fi networks or charging stations. Hackers can set fake Wi-Fi networks, called evil twin networks, to redirect you to malicious websites or steal data via USB cable at a charging station.

  • Phishing

Phishing text, Facebook or email messages with amalicious link that installsmalware and snatches your data.

  • Pop-ups

You might also download malware from suspicious sites while downloading apps or by clicking on malicious pop-ups or links.

Social Engineering

Social Engineering is the art of manipulating users into revealing confidential information that can be used to gain unauthorized access to a computer system.The term can also include activities such as exploiting human kindness, greed, and curiosity to gain access to restricted access buildings or getting the users to install backdoor software.
Being alert can help you protect yourself against most social engineering attacks taking place in the digital realm.

TAKE CARE OF WHAT YOU OWN

When you're out in public, keep an eye on your belongings. Leave nothing unattended, even if you’re only going to be gone for a few seconds. Before you leave the workstation at work, lock the computer screen and secure workspace. Don't forget to bring the cell phone as well as other portable devices.

BE AWARE OF IDENTITY THEFT

Private information should be verified before it is given to anybody else. Even if the requester looks to be someone you know, verify their identification before handing over intimate information. In order to steal information and identities, scammers use methods such as job applications, background check etc. Even if you believe you're protected, it's always a good idea to keep an eye on your bank accounts and credit reports.