The Times West Virginian

Community News Network

November 14, 2012

Tips to avoid cyber thieves

General

• Don't share passwords with anyone. Avoid using common words, phrases, or personal information. Update regularly.

• Keep your operating system, browser, anti-virus and other critical software up to date. Security updates and patches are available free from major companies.

• Verify the authenticity of requests from companies or individuals by contacting them directly. If you are being asked to provide personal information via email, you can independently contact the company directly to verify this request.

• Pay close attention to the URLs of websites you visit. Malicious websites sometimes use a variation in common spelling or a different domain (for example, .com instead of .net) to deceive unsuspecting computer users.

At work

• Major data thefts can happen when attackers gain wireless access to an organization from a conference room or parking lot. Run wireless scanning detection to see unauthorized uses.

• Restrict access and secure the personal information of employees and customers to prevent identity theft.

• Run "penetration testing" on your own system to expose vulnerabilities.

• Maintain a functional backup system.

• Update software with constantly upgraded security.

Email

• Turn off the option to automatically download attachments.

• Save and scan any attachments before opening them. If you have to open an attachment before you can verify the source, take the steps listed below.

• Run anti-virus scans frequently.

Social media, videogames, chat sites

• Limit the amount of personal information you post, such as your address. Watch what friends post about you to make sure you are comfortable sharing that information with strangers.

• Use privacy and security settings that limit the information you share online.

• Be wary of strangers and the huge amount of false information online.

Mobile

• Only access the Internet over a secure network. Maintain the same vigilance on your mobile device that you would on your computer.

• Be suspicious of unknown links or requests sent through text message. Do not click on unknown links or answer strange questions sent to your mobile device, regardless of who the sender appears to be.

Text Only
Community News Network
  • Affirmative action ruling challenges colleges seeking diversity

    The U.S. Supreme Court's support of Michigan's ban on race-based affirmative action in university admissions may spur colleges to find new ways to achieve diversity without using racial preferences.

    April 23, 2014

  • A 'wearable robot' helps her walk again

    Science is about facts, numbers, laws and formulas. To be really good at it, you need to spend a lot of time in school. But science is also about something more: dreaming big and helping people.

    April 23, 2014

  • Cuba is running out of condoms

    The newest item on Cuba's list of dwindling commodities is condoms, which are now reportedly in short supply. In response, the Cuban government has approved the sale of expired condoms.

    April 23, 2014

  • The waffle taco's biggest enemy isn't McDonald's. It's consumer habits.

    Gesturing to Taco Bell, Thompson said McDonald's had "not seen an impact relative to the most recent competitor that entered the [breakfast] space," and that new competition would only make McDonald's pursue breakfast more aggressively.

    April 23, 2014

  • Screen Shot 2014-04-22 at 4.42.47 PM.png VIDEO: Leopard attacks crowd in India

    A leopard caused panic in the city of Chandrapur when it sprung from the roof of a house and charged at rescue workers.

    April 22, 2014 1 Photo

  • The top 12 government programs ever

    Which federal programs and policies succeed in being cost-effective and targeting those who need them most? These two tests are obvious: After all, why would we spend taxpayers' money on a program that isn't worth what it costs or helps those who do not need help?

    April 22, 2014

  • In cuffs... 'Warlock' in West Virginia accused of sexual assault

    Police in West Virginia say a man claiming to be a “warlock” used promises of magical spells to lure children into committing sexual acts with him.

    April 22, 2014 1 Photo

  • Cats outsmart the researchers

    I knew a lot had been written about dogs, and I assumed there must be at least a handful of studies on cats. But after weeks of scouring the scientific world for someone - anyone - who studied how cats think, all I was left with was this statement, laughed over the phone to me by one of the world's top animal cognition experts, a Hungarian scientist named Ádám Miklósi.

    April 22, 2014

  • McCain 1 House Republicans are more active on Twitter than Democrats

    Your representative in the House is almost certainly on Twitter. Your senator definitely is. But how are they using the social network? Are Democrats more active than Republicans, or vice versa? Who has the most followers on the Hill?

    April 22, 2014 1 Photo

  • Do your genes make you procrastinate?

    Procrastinators, in my experience, like nothing better than explaining away their procrastination: General busyness, fear of failure, and simple laziness are just a handful of the excuses and theories often tossed around. Now researchers from the University of Colorado Boulder have added another option to the list: genetics.

    April 21, 2014

House Ads
Featured Ads