Posted in News PC's and Laptops

Tips to protect yourself from attacks cybernetics

Tips to protect yourself from attacks cybernetics Posted on julho 19, 2017

The more digital junk accumulated on your personal computer or your mobile devices, the greater the risks of cyber attacks. According to specialist Eddy Willems, Company G data, sanitation equipment memory and keep the operating system and software always up-to-date are attitudes that help in protecting against cyber threats.

 

“Cleanliness will leave the equipment faster and efficient in everyday tasks,” says the specialist. “It is very important that the operating system and other programs installed on the PC or mobile device are always with the latest version released by the manufacturer. Automatic Updates are recommended because the user engages with other tasks and rarely remembers doing that. In turn, cyber criminals are experts in creating new traps and possess all the time in the world for their practices against users and their actions are facilitated by the dirt and decurrentization of equipment, “Willems says.
I’ve arranged a list of things that can be made to increase your security:
Make back up your files

 

The biggest damage users can face from the attack of a virus of type “ransomware”, which blocks the files until the payment of a ransom, is the loss of files, including photos and documents. The best protection is to save your files in a completely separate system, such as a hard drive (HD) that is not connected to the Internet. Companies in general save copies of data on external servers that will not be affected in the event of a network attack.

 

Suspected emails, websites and applications

 

To contaminate equipment with a virus of type “ransomware”, hackers need to install software on the victim’s computer, which initiates the attack. The most common way is through pishing emails, malicious ads on websites and applications and questionable programs.

 

You must be cautious when opening emails or websites that are not familiar, in addition to not downloading applications that have not been verified by an official store. The suggestion is also read review before installing programs.

 

Use an antivirus program

 

Antivirus programs can prevent the “ransomware” virus from being downloaded into a computer and find when it is downloaded. Most programs can review files to identify if there are type viruses before downloading. Additionally, they can block the installation of secret files.

 

Always make Updates

 

Users should be aware of software updates to minimize vulnerabilities and avoid installing this type of virus. Therefore, you must always download the latest version of a software as soon as it is available.

 

Never pay the hackers

 

Experts suggest that the victims never pay the ransom demand for hackers. On the one hand, this encourages new attacks and, on the other, there is no guarantee that the files will be recovered.

 

Check lists on the Internet

 

One of the suggestions of experts is to verify that your email is in some data leakage list circulating on the network. According to the specialist of Idec Rafael Za, this must be the first step. A free and secure site, created by specialist Troy Hunt, is the have I been pwned: https://haveibeenpwned.com/. Although the site is in English, it is easily usable by all. Just enter your email address registered in Yahoo (or Dropbox) and cliclar on the pwned button. The site will check if your account is on the list of more than 1 trillion hacked accounts in recent years. The site also allows you to create an automatic notification if your account appears in future data leaks.

 

Free tools

 

For those who have been struck by the virus, free removal tools can be found on the Internet. They remove ransomware viruses from the computer and decipher the files that were encrypted in the attack. They also inform on the types of ransomware and show how they are. Some examples are Alcatraz locker, Apocalypse, BadBlock, Bart, Crypt888, Crysis, Globe, Legion, NoobCrypt and SZFLocker.

 

Change passwords

 

If the account appears as a leak, change your password immediately on all the most used services. Use a strong, unique password that blends letters and numbers. Don’t think of a word, but in a phrase (eg: Comeria200HamburgueresHoje). This is the main tip of Edward Snowden, one of the world’s foremost security specialists. If you usually use the same password for all services (Dropbox, e-mail, social networking), recreate different passwords for such services. Write down a paper and leave it in a safe place so you can remember these passwords. It’s not safe to use the same password for all online services.