4 myths about computer and data security

blog1

We are often faced with new data security problems. This shows how little we are progressing in terms acting against these attacks. The number of hackers is growing; this requires more creative approach to deal with them. There are many misinformation also floating around which gives a false sense of security. Here are some myths about computer and data security.

Myth #1: Hackers won’t target me.

hack

Many people think that they don’t have much valuable information for which the hackers will attack them. The fact is that everyone is a target. If you have access to personal or corporate bank, customer data, company secrets, etc. then you are a prime target. The attackers now customize their approach by using handcrafted phishing emails. These hackers will target your known hardware and software configurations.

Myth #2: I can spot phishing attacks.

phising

Most people know how to spot the standard banking scams. They know how to check the URL of links so that you don’t click on something that is unknown. Today’s attackers are smart. The attacks now appear to be from someone you know. It will have reference to your activities specifically. The emails will contain things related to your interests. These emails look absolutely legitimate and hard to spot as phishing emails.

Myth #3: I delete my cookies, so cannot be tracked.

cookies

Cookies are only a small part of what hackers use to track you. Hackers have many other methods of tracking users. For example, your IP address identifies your own computer or your local network. IP addresses provide information about your location and network.

Myth #4: My anti-virus software and firewall will protect me.

antivirus

You cannot rely completely on it. Even the best anti-virus software can prevent 45% of the attacks. So, you will have to be careful in clicking links and the sites you visit even if you have the latest anti-virus installed in your computer.
Keep these myths in mind and always be alert from the activities of hackers. Share as little personal information as possible over the Internet.