10 online security myths


Here is a list of common myths about security that you would do well to read:

I’ve got the anti-virus ...
Yes, you may have one, but this does not make you safe from all kinds of attacks. A good anti-virus solution will indeed protect you against viruses and similar problems. But it'll do nothing to prevent a hacker from lifting information off your system or crashing your PC. There are several others as big online threats as viruses, like phising, spyware and adware. These are, if not bigger, are definitely as grave a threat. Also, new viruses emerge all the time, so you need to update your virus definitions regularly to make sure they're current or, better yet, use software that does that automatically.

Why would someone be interested in me?
Hackers and criminals work hand-in-hand. Identity Theft is the fastest-growing white-collar crime today. Stealing your identity is a lot more profitable than stealing your belongings. Hackers might search for personal information stored on your system. For e.g., your bank account or credit card numbers, which they could use to make fraudulent purchases. And even if you don't do any financial work on your home computer, it would still have your resume, which lists your name, address, work experience and other personal details that you would do well to guard.

Hackers target only big companies
You need not be a big corporation to become a victim. Home computers are one of biggest target groups for hackers. The logic is simple: Hackers usually look for easy prey, and most home PCs are much simpler to break into than a large corporate network. Most big companies have anti-virus solutions and firewalls on their gateway. While hackers can infiltrate into home PCs by using a number of tools available online. Broadband connections are particularly vulnerable because they have a static IP address that can more easily be accessed, and it might take you a while to realize you have been hacked.

Hackers are IT wizards
This popular notion no longer holds true. Today, with so many hacking tools available online, hacking into someone's computer actually takes very little technical knowledge. Any search engine will list site after site of such tools which can be downloaded in a few minutes. Also, these tools come with full directions.

I’ve got a backup
A backup on its own won’t protect you against anything. Also, unless you have a backup of your computer before a virus attack, you’ll only end up restoring data onto an infected computer.

Viruses come only through emails
Emails are just one of the virus carriers. There are a lot of other ways through which a virus can infect your computer. For e.g., via websites, directly over the internet, on disks or other removable media or by installing infected programmes.

If I lose money, my bank will take care
This may be there. But then, first you will have to prove that you were nowhere responsible for the fraudulent transaction. Also, there cannot be any compensation for the time and stress required to sort it out. In several cases of identity theft, it has taken people months to sort things out with their banks or credit card companies.

Security is too time-consuming
It may take a few hours of your time and a regular regimen to install the various security tools on your computer and to keep them updated. But, in case you are hacked, it surely will be more than a few hours of job.


It's my ISP's job
It surely is. However, very few internet service providers (ISPs) provide comprehensive protection. Most ISPs provide some elements of security such as scanning emails for viruses or providing consumers with a firewall, but customers need to understand exactly what they do and, more importantly, what they don’t do. When you're online you're vulnerable to downloaded viruses, because most ISPs screens email only. This doesn't protect users from a virus they may download inadvertently themselves. Similarly, no ISP will protect you from a conmen or hoax emails.

I am on Mac or Linux, so I am safe!
Yeah, it's true that Mac and Linux-based systems may probably be a shade less vulnerable than PCs running Windows, but this doesn't make them invulnerable. For example, Apple announces security updates on a regular basis just like Microsoft. For a hacker is a computer. He doesn't care what platform one is using, they just look for open ports. Many Mac-specific hacking tools are also readily available on the Internet. The new OS X is Unix based. Hacking tools available to Unix users are now applicable to Macintosh. Internet frauds work whatever kind of machine you use.

Blog Archive