8 Ways to Fend Off Spyware

Spyware, malware, phishing and, more recently, ransomware - the list of online threats can be confusing and daunting. Knowing what you’re up against is half the battle. Each of these types of attacks has specific characteristics:

 
Spyware – software that collects information about you or your computer without your knowledge.
Malware – a broad category of software (including viruses, worms, Trojan horses, etc.) that damages your computer, in either a minor or major way.

Phishing – an attempt to get your personal information (usernames, passwords, credit card numbers and), usually for nefarious reasons. Usually accomplished by electronic communication (e.g., email), but also by "social engineering" (tricking people into abandoning standard security protocol).

Ransomware  - a much more extreme version of spyware that will actually threaten to lock you out of your computer or encrypt your files unless you cough up a fee.

Most of these are easier to avoid than they are to remove. The following easy-to-implement security practices will help you protect yourself and your business from becoming easy targets for cybercriminals and online scammers.

 1. Enable two-factor authentication
Passwords are convenient and tried-and-tested when it comes to securing your online accounts and digital data. However, the major downside is their susceptibility to being stolen using spyware or through trickery. The use of two-factor authentication (2FA), however, is a good defense against account compromise even when the bad guys have your passwords. Basically, 2FA adds another layer of protection after your password, usually by combining one factor (your password) with a second factor (a text message/verification code sent to your cellphone number).

As you can imagine, two-factor authentication works only if they are set up ahead of time, so do look into enabling it for all your online services and accounts. In fact, Telesign recently launched turnon2fa.com, a free and comprehensive guide on how to enable 2FA on more than 100 popular websites.

2. Check your login history
A successful spyware or phishing event could give hackers the credentials for an online service, which they can access for their criminal activity. This can be particularly problematic when undetected, and can result in liabilities or repercussions that their victims are left to deal with.
Fortunately, most Web services offer the capability to track the most recent logins in the context of the time it occurred, the mode of access and the destination IP address. The latter makes it possible to deduce the location of access, and can serve as a red flag; if you see logins to your account from physical locations you’ve never been to, it may be time to change the password.

3. Check the list of authorized devices
A common practice for many app-based online services is to create a unique security token after the initial authentication to eliminate the need to key in the password again. The list of authorized devices is typically easy to access, which is a great way to check if someone else is accessing an account on the sly. Moreover, users who believe that their password may have been compromised are well-advised to delete all authorized devices immediately after changing their password, which will de-authenticate unauthorized parties.

4. Install anti-malware software
This will sound cliché, but the easiest way to protect yourself from common malware is to install appropriate anti-malware software. This approach does not work well against more sophisticated hackers wielding custom malware on a spear phishing rampage. And some studies have shown that standalone anti-virus software is no longer effective in preventing the increasingly sophisticated level of attacks being used today
Still, anti-malware software does offer a good basic defense against known and older malware, freeing up their cerebral matter to discern phishing attempts. AV-TEST, an independent IT security provider, publishes an updated list of some of the best anti-malware software for Windows users.
    
5. Don’t delay your security updates
If you’re like most people, it’s easy to ignore those pesky pop-up boxes imploring you to install software updates, even when they include important security patches. The bottom line is that doing so places you at great risk. Hackers can take just days or even hours to dissemble the latest security updates once they’re released by software companies, determine the problem they address and to construct a malware that exploits it.
While the option of denying updates is no longer available to Windows 10 users, most software lets you delay the installation of updates indefinitely. With this in mind, you should attempt to load patches as soon or as often as possible to stay protected.

6. Never give out your passwords, ever
This should be obvious, but it's still a security plague: You should never give out your passwords to anyone, period. Legitimate administrators will already have the appropriate level of access to perform whatever actions they require – without having to ask for your password. As it is, anyone asking you for your password should immediately be suspect, especially if it happens over a faceless medium such as email or a chat app. In which case you have to assume the sender’s accounts have been compromised.

7. Stop clicking on links in emails
A common trick of the bad guys is to get their victims to click on a URL link that brings them to a malicious website. The site may either attempt to inject a security exploit to attack the visiting browser, or it may be designed to look like a legitimate website as part of an elaborate phishing attempt.
And yes, people are still doing it. While it seemingly peaked as an issue about 10 years ago, new studies have shown that malicious attachments are back on the scene as a security risk.
There are so many ways to mask or obfuscate a real link that it’s better not to click on links sent via email messages at all. A safer move is to type it out the URL manually into the web browser instead of relying on the supplied link.

8. Perform offline backups
While backups are not typically mentioned when it comes to security practices, they’re a crucial safeguard against a new breed of security threats called ransomware, which works by threating to encrypt user file or even lock users out of their computer altogether. Once done, it then attempt to exact a ransom for the secret key required to unlock the data or computer.

An offline backup allows businesses to restore their files without paying the ransom. Note that cloud sync services are generally not a good option here – because any encrypted files (such as ransomware) will just be synchronized to the cloud, as well as across all devices – though those that offer an unlimited number of backups could potentially work. However, only Dropbox for Business offers this at the moment.
CIO: http://bit.ly/1JbK8xd

 

« Cyber Liability Insurance’s Data Problems
The Differences Between Targeted Attacks and Advanced Persistent Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Bishop Fox

Bishop Fox

Bishop Fox is a leading authority in offensive security, providing solutions ranging from continuous penetration testing and attack surface management to product and application security assessments.

Malwarebytes

Malwarebytes

Malwarebytes provides artificial intelligence-powered technology that stops cyberattacks before they can compromise computers and endpoints.

Titus

Titus

Titus is a global leader in enterprise-grade data protection solutions.

Swivel Secure

Swivel Secure

Swivel Secure is an award winning provider of multi-factor authentication solutions.

Proofpoint

Proofpoint

Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging.

Oodrive

Oodrive

Oodrive is the first trusted European collaborative suite allowing users to collaborate, communicate and streamline business with transparent tools that ensure security.

Armadillo Sec

Armadillo Sec

Armadillo provide penetration testing and vulnerability assessment services.

GraVoc

GraVoc

GraVoc is a technology-consulting firm committed to solving business problems for customers through the development, implementation, & support of technology-based solutions.

Elevate Security

Elevate Security

Elevate is the leading Security Behavior Platform, changing employee security habits while giving security teams unprecedented visibility.

RhodeCode

RhodeCode

RhodeCode is an open source repository management platform. It provides unified security and team collaboration across Git, Subversion, and Mercurial.

Cyber Management Alliance

Cyber Management Alliance

Cyber Management Alliance is closing the divide in cyberspace by bringing together the best qualities of thought leadership and operational mastery of cyber security management.

Maxxsure

Maxxsure

Maxxsure provides a platform for executive management, leveraging proprietary technology that identifies, measures, and scores a company’s cyber risks.

Fenix24

Fenix24

Fenix24 is an industry leader in the incident-response space. We ensure the fastest response, leading to the full restoration of critical infrastructure, data, and systems.

Unciphered

Unciphered

Unciphered was created as the first company providing services for opening locked hardware cryptocurrency wallets.

The Purple Guys

The Purple Guys

The Purple Guys offer Trouble-Free IT Support to businesses across the Central and Southern US. Safe and Secure, Rapid Response, Friendly Support that’s our Purple Promise.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.