Facebook Twitter Instagram YouTube LinkedIn
    Facebook Twitter Instagram LinkedIn YouTube
    Trending
    • IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’
    • Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases
    • BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles
    • Security Automation Cuts Down Expenses and Saves Time for IT Teams
    • IBM Think 2022 – Embracing the Present, Preparing for the Future
    • A Game of Numbers: The Correlation Between Technology and Sports Betting
    • Software-based Enterprise Solutions for Navigating the “Too Much Information” Age
    • A Look At The Last Generation Of Internal Combustion Engines
    TechSpective
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    • Technology
      Featured
      March 1, 20216

      Could Home Study Be Better for Education? Using Technology to Craft a Better Tomorrow

      Recent
      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

      May 15, 2022

      A Look At The Last Generation Of Internal Combustion Engines

    • Reviews
      Featured
      March 4, 20211

      Dell’s UltraSharp 40 – Improving Work and Workplaces with Monitor Innovations

      Recent
      April 7, 2022

      Dell’s Latitude 5430 Rugged – Redefining the Extremes of Mobile Computing

      October 12, 2021

      Innovating Home Video Conferencing: Dell’s New 27 Video Conferencing Monitor – S2722DZ

      September 22, 2021

      Review: Intrusion Shield

    • Podcasts
    • Security
      Featured
      March 7, 20212

      Pandemic Unmasks Vulnerability to Automated Bot Attacks

      Recent
      May 23, 2022

      IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’

      May 14, 2022

      Ransomware is Indiscriminatory – Prepare for Everything to Fail

      May 5, 2022

      Cybersecurity Myths that are Compromising Your Data and How to Address Them

    • Microsoft
      Featured
      September 12, 20201

      The Microsoft Surface Duo: The Communications Device for Those That Think Different

      Recent
      April 8, 2022

      AI and Why Windows 12 Could Be a Far Bigger Advance than Windows 95 Was

      October 11, 2021

      The Surface Laptop Studio: Building a Windows 11 Targeted Laptop

      August 28, 2021

      Why Microsoft’s Hardware Baseline for Windows 11 Is Important

    • News & Analysis
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

      May 20, 2022

      IBM Think 2022 – Embracing the Present, Preparing for the Future

      May 14, 2022

      Apple vs. Dell: Choosing Which Company to Work For

    • Business
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      Security Automation Cuts Down Expenses and Saves Time for IT Teams

      May 18, 2022

      Software-based Enterprise Solutions for Navigating the “Too Much Information” Age

    TechSpective
    You are at:Home»Security»Data Protection»8 Best Practices for Cyber Security on Black Friday and Cyber Monday
    Black Friday
    Image from Pixabay

    8 Best Practices for Cyber Security on Black Friday and Cyber Monday

    2
    By Joseph Carson on November 22, 2016 Data Protection, Identity Theft, Malware, Phishing, Security Awareness

    Cyber security is an incredibly hot topic right now. With more than 3.5 billion Internet users worldwide, there are millions of opportunities for hackers to exploit, and in recent years, Black Friday and Cyber Monday have become prime targets for cyber criminals to create scams that lure unsuspecting victims.

    If we look at all of the cyber breach reports in the past year – we can clearly see that it has been a busy time for cyber criminals. Public reports describe over 500 data breaches and more than 1.2 billion records stolen this year alone.

    So why do we continue to see so many cyber breaches? If we look at why many of the breaches in the past year have occurred it comes down to three major factors: Human Factor, Identities and Credentials, and Vulnerabilities.

    Every day billions of people power up their devices and connect to the internet to access online services so they can get the latest news, shop for the best deals, chat and connect with friends, stream music and videos, get advice for health, share their thoughts and access financial information. As more and more people and business’s use online services, they quickly become a target of cyber criminals and hackers. It is critically important to know how cyber criminals target their victims, what you can do to reduce the risk and make it more challenging for the attackers who steal your information, your identity or your money.

    Here are 8 simple tips that we at Thycotic feel all shoppers can benefit from as we approach the holiday season:

    1.) Limit Personal Identifiable Information

    Whether you are about to create a new account or if you already have an existing account make sure that you only enter the basic information required to get the account activated and not to put excessive information that could put you at risk. Many services will try to tempt you to put more information like date of birth, home address, location details and mobile numbers to make it easier for other people to find you but in fact this increases cyber security risks and cyber criminals can also find this information. If you have already added this information set them to hidden or remove them from your profile.

    2.) Increase Default Security Settings

    Many websites privacy is basic or turned off. Also, security is optional. Make sure to review what privacy and security options are available and enable them. Make your account less visible and make sure the security is sufficient for the data or services you plan to use the account for. If multi-factor authentication is available, use it preferring to use an Authenticator application to SMS. Make sure to enable alerts and notification on your accounts so that you get alerted on any suspicious activity. Also, make sure to limit and receive notifications when anyone is attempting to tag you.

    3.) Use $tr0ng3r Passwords

    When choosing a password, make sure to choose a strong password that is unique to that account. The average age of a web password today is years and many websites do not do a great job telling you how old your password is, how weak it is, and when it is a good time to change it. This is your responsibility to protect your account so make sure to protect it wisely. If you have many accounts and passwords use an enterprise password and privileged account vault to make it easier to manage and secure them. Never use the same password multiple times. Get into the habit of using password phrases.

    4.) Look Out for HTTPS

    Wherever possible, make sure the website is using HTTPS in the URL. This ensures that the data transferred between the web browser and the website is encrypted. This will limit the ability for any person in the middle from monitoring or watching your data.

    5.) If Possible, Use and Have Multiple Digital Identities

    Create multiple accounts to de-risk your information. For example, setup multiple email accounts: one used for communication, one used for subscribing to for example different online newsletters, airport Wi-Fi and other services that require an email address and then another that is used to resetting passwords which has higher security settings. This helps de-risk the information and also limit your risk of having all of your eggs in one basket.

    6.) Limit What You Do Over Public Wi-Fi and Use the Following Best Practices

    Better not use a public Wi-Fi network without VPN. Instead, use your cell network (3G/4G/LTE) when security is of the utmost importance. When using public Wi-Fi, ask the vendor for the correct name of the Wi-Fi access point, whether it has security and whether it is common for hackers to publish their own Wi-Fi SID with similar names. You should be sure to disable Auto Connect Wi-Fi or Enable Ask to Join Networks because hackers use Wi-Fi access points with common names like “Airport” or “Cafe” so your device will auto connect without your knowledge. Also, do not select to remember the Wi-Fi network. Do not click on suspicious links. Beware of ads that could direct you to compromised websites. Be sure to use a least privileged user or standard user while browsing, as this will significantly reduce the possibility of installing malicious malware. Finally, always assume someone is monitoring your data over public Wi-Fi. If you have a mobile device with a personal hotspot function, always use this over public Wi-Fi where possible.

    7.) Before “Clicking” Stop, Think and Check if it is Expected, Valid and Trusted

    We are a society of clickers; we like to click on things like hyperlinks. But you should always be cautious of receiving any message with a hyperlink and ask yourself was this expected? Do I know the person who is sending it? On occasion you should ask the person if they actually sent you something before clicking on something which might be malware, ransomware, a remote access tool or something that could steal or access your data. Nearly 30% of people will click on malicious links and we need to be more aware and cautious. Before clicking: stop and think.

    8.) Use Credit Card or Secure Payments Versus Debit Card

    When making online purchases, first make sure that website is using HTTPS. Do not make purchases over public Wi-Fi and prefer to use a credit card or secure payments that has Internet protection when making online purchases rather than using a debit card which has less protection

    The holidays are fast approaching. Be sure to stay safe online with these best practices and avoid becoming the latest headline as the next victim of cyber-crime.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleHow Dell EMC Is Displacing HPE Storage in HP Accounts: Case Study
    Next Article Why I’m in Love with the Surface Dial
    Joseph Carson
    • Website

    Joseph Carson is a cybersecurity professional with more than 20 years’ experience in enterprise security & infrastructure. Currently, Carson is the Chief Security Scientist at Thycotic. He is an active member of the cybersecurity community and a Certified Information Systems Security Professional (CISSP).

    Related Posts

    IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’

    Cybersecurity Myths that are Compromising Your Data and How to Address Them

    Growing Attacks Underscore the Importance of API Security

    Comments are closed.

    Site Sponsors
    Intel
    DevOps.com
    Adobe
    PopSpective
    • Technology
    • Popular
    • Top Reviews
    May 20, 2022

    Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

    May 20, 2022

    BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

    May 15, 2022

    A Look At The Last Generation Of Internal Combustion Engines

    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    9.7
    November 16, 2018

    Review: BlackVue DR900S-2CH Vehicle Dash Cam

    9.5
    September 2, 2015

    Review: Microsoft Band

    May 27, 2014

    Protect your family photos with ScanMyPhotos

    Adobe
    Popular Posts
    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    Adobe
    Adobe
    PopSpective
    Adobe
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    About

    TechSpective covers technology trends and breaking news in a meaningful way that brings value to the story, and provides you with information that is relevant to you. We offer in-depth reporting and long-form feature stories, as well as breaking news coverage, product reviews, and community content in plain English terms, and with a unique perspective on technology.

    Adobe

    © 2020 Xpective, Inc.

    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact
    © 2021 Xpective, Inc.
    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact

    Type above and press Enter to search. Press Esc to cancel.