Online Security

The World Get Safe Online report provides some frightening facts. From a lack of up-to-date security software to a failure to understand that internet security requires layers of security software, World internet users are leaving themselves wide open to online ID theft and fraud.

Your identity alone is worth up to USD 14,500 to internet criminals.
The World online: A fraudsters paradise
• Anti-virus software is used by 85 per cent of those surveyed by ICM on behalf of the Get Safe Online campaign - This is good news;

• 48 per cent of net users surveyed failed to update definition files at least monthly - This is poor practice, signature based security software need updating often;
• Anti-spyware protection was used by less than 23 per cent - WORLD internet users clearly do not know that anti-spyware offers real-time protection that is always on unlike signature based software;
• Nearly half (47 per cent) of WORLD internet users are not using any anti-phishing website authentication software - This is dreadful, phishing attacks are the preferred means for most attacks.


You are at risk
WORLD attitudes to online safety are patchy, leaving WORLD internet users open to scammers who empty compromised accounts of funds on a whim.

The lack of protection against phishing scams is concerning due to the increased presence of this type of scam.
• It is estimated that an average WORLD worker earns USD23,764 a year;
• The average WORLD adult owns 2+ credit cards;
• The average WORLD worker has the equivalent of a months salary in reserve;
• If you fall into any, or all, of the categories above this makes you worth USD14,500 to internet criminals.


Protect yourself
Take time to educate yourself and your family so you understand the risks and apply reasonable judgement when you're online.

Internet threats are always changing and Internet crime runs across borders. It is up to you to be wise to online threats.
Millions of WORLD Internet users are putting themselves at risk of attack from internet criminals. Why? Because they don't understand threats to their PC or how to guard against them.


Protect your PC
Ensure your PC is secure by doing a 'SAFE' check:


S = Spyware - run an anti-spyware programme

A = Anti-virus - get anti-virus protection
F = Firewall - have a firewall and make sure it's switched on
E = Ensure your operating system is updated


Protect you and your family
Take time to educate yourself and your family so you understand the risks and apply reasonable judgement when you're online.
Keep monitoring and stay alert
Internet threats are always changing. The Home Office announced the launch of a new police unit dedicated to fighting cybercrime. Given that the scale of online fraud and internet crime runs into billions it may be too little too late. Internet crime runs across borders. It is doubtful at this stage that one poorly funded police unit can achieve results given these circumstances.

As ever, the buck stops with you.


Did you know...?
• Only 15% of people believe that it's their own responsibility to protect themselves from cyber crime;

• 49% believe it should be the responsibility of big business;
• 11% think it should be the Government's responsibility;
• One in five people in the WORLD (17%) said Internet crime was of greater concern than physical crimes like car theft and mugging;
• But despite this, 22% of us still open suspicious files from unknown sources and can unwittingly spread viruses to others.
It seems when it comes to safe computing there is confusion about how to practice this. Although a massive 87% of people surveyed said they rated securing their computer as one of their top security priorities, 52% of people went on to say they had little or no knowledge of safe computing practices.
Furthermore, most of the Internet users interviewed didn't update their security software enough - leaving them vulnerable to online attack. Only a third of respondents (32%) updated their security software at least every three months.
The lesson is clear, get protected if you want to get the best from the web.


When
children head off to School or University, parents face inevitable demands for laptops to help with course work. Computers are great tools for children - access to the internet is educational. But in the final analysis, any powerful tool needs someone to be responsible for it.


Accessories
• Blank CDs/DVDs are useful for burning a backup copy of a home work assignment or dissertation project that your children can't afford to lose.

• Consider using a USB key(s) for easy data transfer. An extra ethernet cable and a handy wireless card can be useful backup if you don't have wireless built-in.
• A good backpack for your laptop, its easier when you or your children are on the go.
• A lap top security cable, especially for older kids who might be boarding or in halls at University.
• Last, but never least, install/update security software for your systems. You cannot exercise parental responsibility without it.


Top tips
Below are just some of the steps you should take to ensure that your children are adequately protected against online threats. Send them off to School or University, confident that they are safe.

• Make sure the system is patched and stays patched with all the latest updates
• You can configure most software to automatically check for updates
• Don't just focus on the patches for the operating system, remember all those other programs and pieces of software on the computer that need to be updated as well
• Ensure your system is running an antivirus and internet security programme and has up to date definitions; set updates the the live update mode
• If you run a windows box, ensure your firewall is turned on
• Macs have a built in firewall as well, so ensure it is turned on, and don't forget those Advanced options in Leopard!
• If you're running an operating system that doesn't have a firewall built in, look for a third-party firewall that is compatible for that system
• Screen savers, that are password protected, are another good option provided you do not set the timeout on the screen saver to be something like 30 minutes or an hour since that will defeat the purpose
• Do not run your system with Administrator privileges as a matter of course, instead, set up an account as a regular user and run with that account except in those rare instances when you need the greater privilege
• If you are using wireless take great care. Ensure that you encrypt your data. However, there are many times that you have to attach to an open wireless network. It may be that the school or university has an open wireless network. In such cases, you don't have control over how you connect but you should still secure your data
• Stay away away from peer-to-peer (P2P) networks. Whilst growing in popularity, they are also a growing risk. The risks range from the software you download to participate in the P2P network (obtaining spyware or other beasties) to the actual files being distributed or obtained. A vast majority of the files being shared are copyrighted songs and movies which is illegal and can land you in very hot water indeed


Spam is the online version of junk mail and generally tries to sell you something in which you have no interest. It is annoying and intrusive and clogs up your inbox. Check out our golden rules below of what to do when dealing with spam.
What is unwanted email?
Unwanted email, sometimes known as junk or spam email, is unsolicited email advertising. Examples of unwanted email:

• Adverts for porn or gambling sites.
• Work from home schemes.
• Online pharmacies.
• Advertising 'Herbal Viagra' and similarly improbable products.
• Selling implausibly cheap (pirated) software.


A substantial majority of the email that goes over the internet every day is unwanted junk mail.
How spammers get your email address
Spammers collect addresses in many different ways, including:

• Guessing. Spammers use automated software to generate addresses.
• Harvesting from websites. If an email address is embedded in a webpage, spammers can use spiders (similar to those used by search engines) to find them.
• Online registration. If someone gives their email address to a dodgy website or one with a lax privacy policy, the site owner can sell the addresses to spammers.
• From other spammers. It's possible to buy lists of email addresses by the million online.
• So-called spam email cancellation services. These bogus services offer to block unwanted email but really collect addresses.


Why stop unwanted email?
• It wastes bandwidth.

• Filtering it manually is very time-consuming.
• Unwanted email often contains offensive images.
• It propagates online fraud, such as phishing.
• Often contains viruses.


How to spot spam
Filtering email manually is time-consuming but here are some tell-tale signs you can use to do so if you only get a limited amount.

• From someone you don't know.
• Contains weird misspellings (e.g. 'p0rn' with a zero), designed to counter spam filters.
• Offers something for sale.
• The subject line and contents don't match.
• Contains a beguiling or urgent call to action ('Buy now to get 50% off').
• If you get more than a handful of unwanted emails a day, we recommend you use a mail filter to get rid of the rubbish automatically.


Most decent webmail platforms these days have good spam filters in place, including Tiscali, AOL, Google Mail and others. Use these to fine-tune what you don't want to see.
 
Top