This
month’s article continues on the topic of Computer
Myths and Rumours. Part 1&2 are available on this blog.
I use A Tablet/Ipad So I am Safe From Attack
Truth or Myth: Myth. This is a common myth and one which seems to
be catching out large groups of internet users. Before the arrival of the
tablet/ipad technology the primary methods of attack were via email, via
websites, application downloads, illegal music and video sites, and phone
scamming. With the change in the way apps are delivered to tablets/ipads the
scammers are now moving to different methods of attack with a good deal of
success. The Achilles heel of the tablet/ipad is the internet and the degree to
which these devices rely on it for storage. Cloud based email systems such as
hotmail and gmail provide a relatively easy way for scammers to gain access to
your data. Once they have done that they can launch attacks on your bank
accounts and your friends. This is by far the most common attack I see on
tablet/ipad users.
Prevention Tips: Make sure all passwords on all cloud based
accounts are unique and not similar. My article from June 2014 outlines some
good password tips.
Employ two
step verification on the gmail and hotmail accounts to prevent unauthorized
access.
Do not
store sensitive information on your tablet/ipad or on the cloud and if you must
ensure it is encrypted to the highest level possible.
Never give
out passwords to unknown people and do not accept calls from people claiming to
be from Microsoft or your anti-virus company.
Never reply
to emails requesting password changes unless you have initiated the change.
I Don’t Need To Backup All My Information Is On
The Cloud
Truth or Myth: Myth. Reliance on the cloud for backup is
not a good idea and you should always maintain a backup of your data on your
own external device where possible. On tablets/ipads this will mean copying the
data to your desktop/laptop if you have one! If you don’t have a pc or laptop then
ensure your keep the data on the cloud in at least two different locations. As
with your email use strong passwords and change the password frequently. When it comes to technology “plan to fail,
don’t fail to plan” for the day when your device is hacked or just simply dies.