Safety Habits to Incorporate in 2019
In relation to the start of the new year, ESET, a leading company in proactive threat detection, brings together a guide with useful information that helps users to take care of their information and that of their contacts when surfing the Internet or using social networks.
“From ESET we consider that the incorporation of safety habits allows us to enjoy more the use of technology, and avoid headaches. That’s why we developed a list with some new year resolutions that every user should consider as a goal for 2019. “, said Camilo Gutierrez, Head of the Research Laboratory of ESET Latin America.
Many times, social networks are the scenario in which computer crimes occur. Whether it is grooming, harassment or other types of cases, it is important to make the complaint. Some social networks such as Facebook offer a guide to report an inappropriate event that includes cases ranging from a false profile, offensive content or some other type of crime of a sexual nature, among others. In Argentina, the NGO Argentina Cibersegura developed a guide to know how to report a cybercrime.
Fake news is a problem, since many of these messages appeal to the emotional and quickly become viral. In the case of competitions, it is important to remember to review the terms and conditions, that the organizer is easily identifiable, that there is a date for the award ceremony and to confirm that there are other participants. In case it’s too late, if the contest was promoted through Facebook you should use the option “report”.
When receiving a message through the mail or social networks that it is a scam, notify the sender and notify the contacts. You can also inform through social networks so that users are alert and do not fall into the trap.
Review what permissions are given to the apps associated with the profiles
The episode of Facebook and Cambridge Analytica where the social network yielded data collected from an application, which users installed without reading the permissions they granted, revealed the lack of responsibility and awareness regarding the value of personal information. ESET published an article explaining how to know what kind of information is shared with companies and developers of apps through permissions.
The excessive exchange of digital information can have its consequences, especially in social networks. That is why ESET recommends limiting access to what others can see to the maximum, making revisions of the permissions that are granted with certain regularity and better configuring the privacy options available in each of the social networks that are used. In this regard, ESET developed a guide to improve security and privacy in Facebook in 5 steps.
Before tagging a friend, acquaintance or contact, it is important to consult or analyze if you would like or be interested in being linked to that image or video, since many users do not want to be exposed on the network. Even when it is not a personal image or an event, but the use of a label on a funny image or promotion.
Do not share or send files before checking that they are safe
It is common for attackers to infect their victims through attachments. These can arrive through the mail, social networks or services such as WhatsApp. It is therefore important, before forwarding any file, to confirm that the file comes from a reliable source.
Changing passwords for accounts can avoid even greater complications. To help remember multiple different passwords for each account, you can use a password manager, such as KeePass. With this tool you can store the username and password of each platform and update the information each time a change is made.
Activate the double authentication factor
Activate the double factor of authentication in each of the services that is possible, as long as it is available, as in the case of Gmail, Facebook, Instagram, Twitter or other platforms. It is an additional security layer that helps prevent access to accounts without consent.
Keep equipment and devices updated with the latest updates. Many computer attacks were caused by exploiting vulnerabilities that were patched in updates. In the famous case of the WannaCry ransomware, it took advantage of a vulnerability in computers that used Windows, despite the fact that the manufacturer of the operating system, Microsoft