Technology is ever-evolving and advancing to make our lives more convenient, fast-paced, and comfortable. You might not realize that some of these flashy new features that technology has to offer could be putting your information at risk. Some of these risky behaviours may seem innocent, and you might think that nothing will ever happen to you. These risky behaviours can, however, have very detrimental consequences. Compromised information can ultimately leave you vulnerable to hackers, identity theft, or theft of confidential information. It may result in huge financial loss, damaged credit score, and if the information compromised is related to business, it could mean job loss as well. Here’s how you might be putting information at risk when using the internet.
1. Using an Unsecured Webpage
When you are navigating a website, particularly one with login credentials or e-commerce, make sure that you are on a secure website. Some websites may look legitimate, but they aim to steal your credit card, address, and any other valuable personal information. Even if the site owner does not have sinister intentions, an unsecured website is much easier for hackers to access your information that’s being exchanged. Make sure that the URL begins with HTTPS, as opposed to HTTP. This will indicate that you are on a secured server and that the website you are using is reputable.
2. Opening Attachments
If you receive an email with a suspicious attachment, you could be putting your information at risk by opening it. Opening malicious attachments could give your device a virus and compromise your information. The same scenario could also happen by clicking on a link sent to you via email or social media. Scammers and phishers may try to entice you to open a link or download an attachment so that they can worm into your device and steal your information. They may claim that there is a prize, coupon, or discount by clicking or downloading. They may also use fear by insisting that you must click or download to protect yourself from a threat. Stay vigilant and investigate before you click on any links or open any attachments. It’s also important to have up-to-date security software on your device as an extra barrier to keep your information as safe as possible.
3. Sharing Confidential Information
Today, hackers and thieves don’t need to go very far to access personal information, which could open the door to your most valuable information. The internet has become a means of communication, but we tend to get a little too comfortable and overshare. You may feel comfortable sending your credit card number to a friend who’s making an online purchase or direct messaging someone with a PIN. Your friend or the recipient may be trustworthy, but if their device or accounts become compromised, so does your information on the internet.
Oversharing information publicly is another concern. A great example of this is the popular “Facebook survey” chain circulating, where people list their favourite foods, pets names, maiden names, first car, and so on. It may seem innocent and fun, but you may have just revealed the answers to security questions or hints leading to your passwords. There’s a saying that the “internet is forever”, and this is very true. You may be able to delete a post or a message, but it isn’t gone forever. It could have been saved by someone else before it was deleted and hackers can even recover it after you think that it’s gone. This is how quickly and easily things can get out of hand, so it’s critical to be mindful of what you’re posting online as well.
SEGMENTECH is an advanced cyber security workshop that specializes in Privileged Access Management (PAM) and EndPoint protection. We can assist you with guiding your teams in developing code with a least-privileged approach. Contact us today if you would to discuss why Privileged Access Management is a must-have on every self-developed application.