top of page

DIGITAL SECURITY

  • May 17, 2017
  • 3 min read

College and varsity scholar’s access shared public networks frequently than any group of users on cyberspace. Open networks are considerable for college and varsity campuses as well as workstations, but then again users time and again misjudge the risk of malicious users and malware on unsecured networks. Last year alone, hundreds of colleges and universities across the country have had an episode of database security breaches or network interference. Rosebank College has systems for Rosebank College students that force its students, commanding them to change their passwords and security settings after a certain period of time.

Cyber-attacks target center IT vulnerabilities, but related attacks exist even more probable to occur on unsecured networks of any type, it could be at home or at school. Likewise to the threats posed by hackers and malware, it is prerequisite for students to be attentive of the volume of information they make accessible. Threats can also be posed by social media misusers, communal social media platforms must to stay alert.

Digital lawbreakers can get access to your delicate private information through theft and fraud, like bank account, social security, and credit card numbers. A 2016 survey shown by fin24 Strategy and Study discovered that 8.8 million individuals were victims of identity fraud in the South Africa, with 15 percent of those criminal activities were committed by means of online banking usernames and passwords. Identity thieves can as well make unapproved purchases by means of your check and debit cards by gaining access to payment information using your login identifications.

Since students spend extra time online than almost any other type of internet users; it is prerequisite for scholars to take safety measures to defend themselves from malicious software or users online who pose a threat. Numerous of student’s best common web activities which may include online banking, shopping, downloading torrents movies and updating social media accounts; here are a few know how’s guide to make you more secured online.

  • Do not download free media. Torrents, direct download websites, and streaming hosts because they expose your PC to malware and viruses according to Machay, What Are the Dangers of Torrents (2017). Trojan viruses can install software like key loggers, which is able to record all that you type on your computer, for instance your usernames and passwords, and send this information to online criminals. For you to be less vulnerable to download malicious software, do not use illegal content and piracy websites.

  • Do not save your payment information online. When you purchase with online common retailers for example Amazon or Apple, users have the preference of storing their payment information for future use. Nonetheless, cyber lawbreakers can benefit from this stored information, by creating dishonest transactions on your account or stealing personal information. It is advisable to avoid storing your payment information online. Even though it may perhaps be tiresomeness to type your payment information for every purchase online, your financial wellbeing will be hardly disrupted.

  • Do not share private information on social media accounts. A public post about a holiday trip can make your household a target for burglary. Look at your profile security settings, and limit who can see your posts. Do not add strangers to your friend lists, as these accounts may possibly send spam links to malware and viruses.

  • Change passwords regularly. Once a cyber-criminal acquires your login information for one account, they will time and again try to break into additional accounts using the same details. Hackers can do further destruction if you use the identical username and password everywhere. Use password dissimilarities on dissimilar accounts and program a scheduled for password alteration once every few months.

  • Under no circumstances share your login identifications with any person, even if they appear trustworthy. Company personnel and online store representatives will under no circumstances request for your password.

  • Be vigilant on public networks and computers. Public computers are open to a lot of threats. Users can deliberately or unintentionally install malware, which could collect information from everyone who uses the computer. Cyber criminals will now and again set up free public Wi-Fi spots and use a common scam recognized as phishing to gather your login information.

Sources

http://www.fin24.com/Tech/News/88-million-south-africans-hit-by-cyber-crime-study-20160707

https://www.getcybersafe.gc.ca/cnt/rsks/nln-ctvts/index-en.aspx

https://za.norton.com/cybercrime-prevention

http://smallbusiness.chron.com/dangers-torrents-70661.html

http://www.cnbc.com/2015/11/27/shopping-online-heres-how-to-keep-your-data-safe.html


 
 
 

Comments


Featured Posts
Recent Posts
Follow Us
  • Facebook Long Shadow
  • Twitter Long Shadow
  • SoundCloud Long Shadow

© 2017 brought to you by IIE. Proudly created with Wix.com

bottom of page