Wednesday, October 1, 2014

Busting Computer Myths – Part 3



This month’s article continues on the topic of Computer Myths and Rumours. Part 1&2 are available on this blog.

I use A Tablet/Ipad So I am Safe From Attack
Truth or Myth: Myth.  This is a common myth and one which seems to be catching out large groups of internet users. Before the arrival of the tablet/ipad technology the primary methods of attack were via email, via websites, application downloads, illegal music and video sites, and phone scamming. With the change in the way apps are delivered to tablets/ipads the scammers are now moving to different methods of attack with a good deal of success. The Achilles heel of the tablet/ipad is the internet and the degree to which these devices rely on it for storage. Cloud based email systems such as hotmail and gmail provide a relatively easy way for scammers to gain access to your data. Once they have done that they can launch attacks on your bank accounts and your friends. This is by far the most common attack I see on tablet/ipad users.

Prevention Tips: Make sure all passwords on all cloud based accounts are unique and not similar. My article from June 2014 outlines some good password tips.

Employ two step verification on the gmail and hotmail accounts to prevent unauthorized access.

Do not store sensitive information on your tablet/ipad or on the cloud and if you must ensure it is encrypted to the highest level possible.

Never give out passwords to unknown people and do not accept calls from people claiming to be from Microsoft or your anti-virus company.

Never reply to emails requesting password changes unless you have initiated the change.

I Don’t Need To Backup All My Information Is On The Cloud
Truth or Myth: Myth. Reliance on the cloud for backup is not a good idea and you should always maintain a backup of your data on your own external device where possible. On tablets/ipads this will mean copying the data to your desktop/laptop if you have one! If you don’t have a pc or laptop then ensure your keep the data on the cloud in at least two different locations. As with your email use strong passwords and change the password frequently.  When it comes to technology “plan to fail, don’t fail to plan” for the day when your device is hacked or just simply dies.

No comments: