According to the data, almost 60 percent of those surveyed by Gartner said they are concerned
or very concerned about online security. …
A recent survey commissioned by IBM states that overall user confidence in the Internet is going down as the result of increased phishing and pharming attacks.
Phishing (fish´ing) (n.) The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.
Pharming is the exploitation of a vulnerability in the DNS server software that allows a cracker to acquire the Domain name for a site, and to redirect, for instance, that website’s traffic to another web site. DNS servers are the machines responsible for resolving internet names into their real addresses – the “signposts” of the internet. The term pharming is
derived from the term phishing, the use of a social engineering attack to obtain access credentials such as usernames and passwords. To date however the use of pharming to perform Internet crime for profit has not been demonstrated.
A survey of home PC users found 81 percent lacked at least one of three critical types of security.survey conducted by Internet service provider America Online found that 20 percent of home computers were infected by a virus or worm, and that various forms of snooping programs such as spyware and adware are on a whopping 80 percent of systems. Despite that, more than two thirds of home users think they are safe from online threats.
Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as “intruders”) from accessing any part of your computer system.
Vulnerabilities – you can do computer searches for these terms to find out exactly how they function.
Exploits
Eavesdropping
Social engineering and human error
Denial of service attacks
Indirect attacks
Backdoors
Direct access attacks
You Have a Choice to Make
You recognize the value of the information on your computer – but do you understand the risks you face by exposing your information online? You need to protect yourself and your business from hackers, viruses, spyware, identity theft and other new threats.
You have 3 choices: Ignore the threats (1 in 4 computers will be hacked this year)
Become a security expert (Do you really have time for this?)
Rely on an Internet security expert.
Everyone Needs A Personal Internet Security Expert!
Where do you turn for expert help in locking down your computer(s)? When you have a security problem with your computer, whom do you rely on?
A Tip: What makes a good password? Gone are the days of using your dog’s name as a password. Bad passwords give you as much protection as having no password at all! Passwords should be:
At least 7 characters in length
Include a random mixture of letters, numbers and symbols (#,$,%, etc.)
Be changed every 90 days
You Need Comprehensive Protection
Anti-virus software alone is NOT ENOUGH! Firewalls are NOT ENOUGH! Don’t be lulled into a false sense of security thinking that these cheap stand-alone products will protect you against the vast array of threats you face. Those programs only address one or two aspects of
the security problem.
You want MAXIMUM PROTECTION for your PC. You want peace of mind. In order to protect your computer from hackers, viruses, worms, Trojan horses, spyware, credit and identity thieves and all the other dangerous cyber-threats out there, you must have a A good security service includes:
Desktop Firewall
Locks out hackers and other unauthorized intrusions. Shields your PC from unauthorized communication both to and from your PC, making your PC virtually invisible to hackers and other intruders randomly scanning the Internet for vulnerable PCs.
Anti-Virus
World-class anti-virus protection – including 24/7 scanning and certification that your incoming and outgoing e-mail and any attachments are virus-free — plus scanning of all removable media such as CDs, Zip disks, portable hard drives and floppies.
Spyware & Hacker Tool Detection Continuously monitors, detects, and eliminates more than 80,000 different hacker tools and spyware from your PC, including: pests, spyware cookies, malicious spyware tools, Trojan
horses, keystroke loggers, password crackers, Remote Access Tools (RATs)
Patch Manager
Automatically finds and fixes the security holes and other dangerous vulnerabilities in your PC operating system and software programs that hackers use to break into your computer. Includes official patches to Microsoft Windows® and dozens of popular office and productivity application software programs.
Security Alerts
Warns you of brand new viruses, worms and other security threats as they emerge – including specific recommendations of what to watch out for and how to avoid getting attacked to keep your privacy secured and your PC safe
A good system should also include:
AUTOMATIC software updates
FREE expert technical support and assistance!
Ruth is an avid internet marketer, and therefore has a very intense passion for computer security.
Article Source: Stop Cyber Terrorism, Secure Your Computer