Search This Blog

Showing posts with label Computer Security Tips. Show all posts

Russian IT expert Menshakov listed the ways to protect personal data


According to the expert, to protect yourself from phishing attacks and fraud using malicious software aimed at people working remotely, you need to follow certain rules. In particular, follow the news and discuss threats.

"Knowledge is power. The best defense against online threats is an attack. In the context of the digital space, this means having up-to-date information. The more you know about the methods of deceiving users, the less likely that you will become a victim of hackers and believe a phishing email with an offer to buy a COVID-19 vaccine online or a coupon for vaccination without a queue," said Mr. Menshakov.

The expert also advises checking the sources of emails. It is equally important not to trust emails and text messages from people you know or from organizations that contain requests or improbably tempting offers. Before you click on the link, you need to go to the company's website yourself or call its support service. Checking the sources will protect you from downloading malicious content from phishing links.

"Hover the cursor over the links, study the composition of the URL. If you receive an email with a link, hover your mouse over it, but do not click on it. This way you can see where this URL leads. If the address looks suspicious, delete the message. Risk indicators: Fake links usually look like links to trusted sites, but may contain extra words or domains. If there are doubts about the nature of the URL, do not click on it," advised the expert.

In addition, Menshakov recommends that you secure your devices with several complementary tools. In particular, you can use two-factor authentication (2FA) passwords.

"Regular password changes and two-factor authentication (2FA) are the most effective way to fight hackers," noted the expert.

In addition, you should use a virtual private network (VPN), which will help you establish an encrypted connection and hide activities on the network from hackers.