Internet Safety, Continued

Aug 5, 2013 | IT News

Last month, I talked about malware and how it infects computers.  I also offered suggestions on how to help prevent computers from getting infected in the first place.  One of the things I mentioned was reducing your online presence. 

                By reducing your online presence, I meant be very careful about your online identity.  Give out your personal email address only to people you know and trust.  Get a “junk” email address.  Gmail is free, as is Yahoo.  When going to websites that ask you to create an account or enter in your email address, first I try to give them a fake email address.  I usually use something like asdf@asdf.com.  However, many websites fight against that by sending account activation emails.  You have to respond to an email they send in order to create an account on their website.  In those cases, I give them my junk email account.  Then, I can activate the account and not worry about whether they send spam. 

When creating accounts for access on websites, also watch out when filling in those forms.  Some have a checkmark next to “Please spam me with promotions all the time!”.  Uncheck those.

The bottom line is that when a website asks for your email address, think to yourself “Do I trust them not to spam me or sell my email address to another company”.  If the answer is no, then give them the spam email address.

Another major source of malware and viruses is from peer to peer file sharing services.  Places and software such as BearShare, Limewire, Bittorrent, eDonkey, Gnutella, Shareaza, Kazaa, and others are rife with malware and viruses.   Even Newsgroups (which have been around since the Internet began) have more viruses and malware than real files.  The only safe way to get music, movies, and software is to do the right and legal thing and buy it.  And when I mean buy, get it from a reputable site.  Places like Rhapsody, Pandora, Hulu, Netflix, and so on.

Basically, if you are getting it for free, there is a high possibility that what you get is not what you want.

 

I have created a newsletter at v2systems.com address.  Please feel free to send suggestions on things you would like for me to talk about.  I will make an effort to address anything that comes in, and also be discreet about it.  Otherwise, I will keep blathering on about things that I think are important.

 

More From V2 Systems

The Audit Readiness Problem Government Contractors Can’t Afford to Ignore

Many government contractors are not failing audits because they lack tools. They are failing because documentation is incomplete, evidence is disorganized, and readiness starts too late. This blog explains the most common gaps and how to fix them before an audit begins.

You Can’t Secure What You Can’t See: Why Asset Visibility Is a Cybersecurity Requirement

Asset visibility is one of the most overlooked parts of cybersecurity. In this blog, we explain why businesses need clear visibility into hardware, software, users, and cloud assets to reduce risk, strengthen operations, and support compliance.

When One Suspicious Alert Prevented a Much Bigger Disaster

A former client narrowly avoided a much larger cybersecurity incident after suspicious Microsoft 365 activity revealed an unauthorized intrusion. In this blog, we break down what happened, how phishing may have played a role, why MFA still matters, and what businesses should do next to reduce risk and respond quickly.

CMMC in Practice: How Day-to-Day IT Operations Affect Compliance

CMMC is not just policy. It depends on day-to-day IT execution like patching, access control, monitoring, and documentation. This blog explains what contractors should focus on now, plus why the assessment process can be more expensive than expected.

What Happens After the Breach: How Incident Response Really Works for SMBs

Incident response is what determines whether a cyber incident becomes a short disruption or a major business crisis. This blog explains the real steps SMBs should take after a breach and how MSP support speeds recovery.

Free
Small Business Cybersecurity Checklist

cybersecurity checklist graphic