PROS TIPS - BE CYBER CONSCIOUS

Hackers use various techniques to break into vulnerable networks, servers, and devices via RDP (Remote Desktop Protocol).

Hackers walk through the various steps you take to steal a “sysadmin” (system administrator) password through vulnerable RDP connections.

Once a hacker has access to the sysadmin password, they have full access to the network and the devices within it.

Make sure sysadmins are aware of what data their password gives them access to and protect it.

Close TCP port 3389 if not in use and make sure all security patches have been loaded.

If you think that your operating system (OS) does not have sensitive information, hackers can use your operating system (OS) to do illegal activities such as sending spam, cash out a fraudulent account etc.

PROTECT YOURSELF AGAINST MALWARE

  • Keep your operating system and applications updated.
  • Scan executable files before running them.
  • Only purchase security software from a reputable company via their official website or in a retail store.

WHAT IS ZERO-DAY EXPLOIT AND HOW TO PROTECT YOURSELF FROM THIS ATTACK?

A zero-day exploit is a type of attack that takes advantage of a software or hardware vulnerability that has not yet been patched or discovered by the vendor. These types of attacks can be very difficult to defend against because there is no known fix for the underlying vulnerability. In many cases, zero-day exploits are only discovered after an attack has already taken place.

  • Keep your software up-to-date to help protect yourself against a zero-day vulnerability.
  • Check for a solution when a zero-day vulnerability is announced. Most software vendors work quickly to patch as security vulnerability.
  • Don’t under-estimate the threat. Cybercriminals will seek to exploit security holes and gain access to your devices and your personal information. They can use your information for a range of cybercrimes including identity theft, bank fraud, and ransomware.
  • Always use a reliable security software to help keep your devices safe and secure.

SECURITY PRACTICES

Some top security practices include using strong passwords, encrypting data, and using firewalls. Strong passwords are difficult to guess and should include a mix of upper-and lower-case letters, numbers, and special characters. Encrypting data ensures that it is difficult for unauthorized individuals to access it. Firewalls can be used to block unwanted traffic and help to protect a network.