5 Cyber Security Myths
I recently read an interesting article regarding Computer Security Myths that I believed would be useful to those in the Technology industry. The writers at Lifehacker met with computer security and forensic experts Frederick Lane and Peter Theobald, to discover the truths behind some cyber security myths.
- I’m Not Worth Hacking, I Have Nothing of Worth
Many people believe that since the internet is so vast that they would not be a target or they do not have any valuable data on their computer. The biggest threat in this case is not that they’re being specifically targeted, but that there are internet wide fishing expeditions by automated bots that are searching for vulnerable computers and networks.
- TOR and VPNs Make me Anonymous
If you aren’t familiar with these applications, it is a service that disguises your web browsing so you stay anonymous. As Frederick Lane explains, they are just tools. These tools are good at protecting your identity and security on the internet, but they are not completely secure.
- MAC Filtering and Disabling SSID Broadcast is Enough to Protect my Wi-Fi Network
Some people leave their Wi-Fi networks unencrypted while hiding their SSID or MAC filtering to secure them. This may leave no issues with non-technical users but those advanced technology users may find a way in. Those with Wi-Fi scanning tools such as Kismet can pull hidden SIDs and MAC addresses out of the air.
- My Privacy is Protected by Incognito Mode
Incognito mode can actually protect your privacy, but only from other people using your computer. Many people believe they cannot be tracked in incognito mode, but as Google explains, if you’re logged into your Google account while browsing in Incognito mode, your searches will be saved in your web history. The experts explain that the sites you visit downstream still know who you are, your IP address and keep track of what you do while there.
- I Don’t Need Anti-Malware Tools
A common belief is that if you have “common-sense” and don’t perform any “risky” activity online, you don’t need Anti-Malware protection. However, hackers have found a way to put the “Styx exploit” into advertisements that were shown on Youtube. Whoever viewed these videos on Youtube had their computer attacked and infected with the Styx virus. It is important to recognize that attacks are getting more sophisticated.
HUB International TECHNOLOGY
HUB International TECHNOLOGY is based in Vancouver and focuses on insuring and protecting public and private companies in the technology sector. We offer Risk Management and Loss Control strategies, placing General Liability, Property, Business Interruption, Cyber Liability, along with other coverages for all types of technology companies, including E-Commerce.
 Alan, Henry. "Five Computer Security Myths, Debunked by Experts." Lifehacker. Lifehacker, 09 Jul 2014. Web. 21 Jul 2014. <http://lifehacker.com/five-computer-security-myths-debunked-by-experts-1602290081>.