SlideShare a Scribd company logo
Top
Information
Security Threats
of 2016 and
How You Can
Combat Them
A look at the newest threats posed to you on
the internet and how you can stay safe.
 It’s 2016 and the internet continues to evolve as more and more people and even some inanimate
objects come online.
 Think about it, you can buy refrigerators and vacuum cleaners that are linked into the internet
now. The internet of things, which sounds like a bad 90’s VHS, is very real and continues to grow
each and every day.
 And with the growth of the internet comes the growth of hacking and cybercrime. Since the advent
of the internet hackers have been hiding in the shadows looking to exploit weaknesses for their
own personal gain
 And despite massive gains on the information security front, cybercrime is always a half-step
ahead.
 That’s why we’ve compiled a list of some of the biggest Information Security Threats facing us in
2016 along with some tips on how you can stay safe. Some are old. Some are new. But all of them
will be prevalent this year and without a little bit of knowledge and a lot of precaution, you could
find yourself being victimized by any one of them.
Retail Data Hacks
 Retail Data Hacks are nothing new. Every year hackers cause breaches to
major chains and large internet retailers in the hopes of stealing valuable
credit card data that can be sold on the black market or used for personal
gain.
 From the standpoint of these retailers, it’s important that
they encrypt everything and keep the most up-to-date security
implementations possible, but as a customer you can take steps to stay
safe too.
 Namely, you can request a pin and chip card from your bank to replace
your traditional debit card. These chip cards are much more secure than
their predecessors and can help prevent having your information stolen by
any malicious third parties.
Mobile Threats
 You use your mobile device for everything nowadays. From surfing the
internet to checking your bank accounts, mobile devices have become
ubiquitous in today’s society. Unfortunately, mobile devices are not
always the most secure. There are a number of ways you can stay safe
on your mobile device.
 For instance, make sure to activate encryption options on your phone.
Only download apps from trustworthy sources like the Apple store or
Google Play Store. Stay off of unsecure Wi-Fi networks. And most of all,
download an antivirus app to scan your phone regularly.
Phishing Attacks
 Phishing is a practice where hackers send you an email or a link in the hopes of
stealing personal information. One of the most common phishing tactics is the
infamous “Nigerian Prince” email, in which a hard-on-his-luck Nigerian Prince
offers you a large payment if you can just give him some personal information or
even a little bit of money to help him get back on his feet.
 Nowadays, phishing is much more sophisticated with hackers building entire fake
websites aimed at manipulating people into giving away precious personal
information like banking numbers or passwords. Unfortunately, there is no silver
bullet for phishing. You just have to be vigilant. Never open attachments from
unknown senders. Don’t provide personal details on sites that aren’t properly
authenticated and, when in doubt, don’t respond at all.
Identity Theft
 Identity Theft can be the result of any of the aforementioned items on this list.
You can lose your identity in a phishing attack, it can be stolen in a data
breach or someone could hack your phone. Either way, once your identity has
been stolen you really won’t care so much how it happened as how you can
fix the problem.
 There are lots of tips to help keep your identity safe. From physical tips like
always shredding documents with personal information on them, to cyber tips
like avoiding suspicious websites and never giving out personal information
over unencrypted channels, you can never be too careful.
Healthcare Data Hacks
 One of the most famous Healthcare data Hacks occurred in 2015 when
Anthem was hacked and over 78 million medical records were exposed.
If you think about it, the healthcare system is a great access point for
hackers because medical records contain tons of personal information,
everything from social security numbers and addresses to financial
records.
 Unfortunately, aside from monitoring the news there’s not a lot you can
do to protect yourself from this threat. The medical field is already
mandated to use SSL encryption and spends millions of dollars each
year on a comprehensive information security strategy. It’s just that
sometimes a breach happens.
Attacks on Banks
 This is another cyber threat that individuals may not be able to do a lot about.
Every year the Banking Industry is one of the premier targets of cyber criminals
and every year you hear about one or two successful hacking attempts.
 This isn’t to worry you though. Banks spend top dollar on security solutions like
SSL encryption, threat assessment, malware scanning and all range of other
information security products. And thankfully, if you’re in the US, your money is
insured by the FDIC.
 But that doesn’t mean you shouldn’t be vigilant and stay on top of your accounts
anyway—just to be on the safe side.
Additional Information Security Tips
As we’ve said, some of these threats are capable of being mitigated by you, personally. Others are
not in your control. But that doesn’t mean you can’t still take every precaution. Here are five
additional tips to help you stay safe in 2016.
 1. Use Strong Passwords
This one is pretty obvious but you’d be surprised how many people go with something easy to
remember (like, say, “password”) instead of something safe. Use passwords that include sequences of
numbers, letters and symbols. Your password shouldn’t be easy to guess.
 2. Don’t Open Suspicious Emails or Attachments
Duh! If you don’t know the sender or the file extension, chances are they’re not safe.
 3. Destroy Sensitive Documents
We already alluded to this, but if a document contains sensitive information you should probably shred it
before disposing of it.
 4. Use a VPN to Secure Your Internet Connection if You’re on Public Wi-Fi
Public Wi-Fi is notoriously unsafe. Hackers prey on the unsuspecting masses at places like airports and
coffee shops. Always use your VPN to add a layer of much-needed security when on a public Wi-Fi
network.
 5. Keep Your Antivirus Software Up to Date
Another obvious tip that many people don’t follow. Sure downloading new updates may be a pain. But
in the two minutes it takes you to do it, you’re keeping yourself safe.
For More Details on Information Security
Threats
Blog:
cheapsslsecurity.com/blog
Facebook: CheapSSLSecurities
Twitter: SSLSecurity
Google Plus:
+Cheapsslsecurity

More Related Content

More from CheapSSLsecurity

Various Types of OpenSSL Commands and Keytool
Various Types of OpenSSL Commands and KeytoolVarious Types of OpenSSL Commands and Keytool
Various Types of OpenSSL Commands and KeytoolCheapSSLsecurity
 
What is Certificate Transparency (CT)? How does it work?
What is Certificate Transparency (CT)? How does it work?What is Certificate Transparency (CT)? How does it work?
What is Certificate Transparency (CT)? How does it work?CheapSSLsecurity
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017CheapSSLsecurity
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018CheapSSLsecurity
 
Is your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if notIs your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if notCheapSSLsecurity
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
How Hashing Algorithms Work
How Hashing Algorithms WorkHow Hashing Algorithms Work
How Hashing Algorithms WorkCheapSSLsecurity
 
Quantum Computing vs Encryption: A Battle to Watch Out for
Quantum Computing vs Encryption: A Battle to Watch Out forQuantum Computing vs Encryption: A Battle to Watch Out for
Quantum Computing vs Encryption: A Battle to Watch Out forCheapSSLsecurity
 
Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22CheapSSLsecurity
 
Hashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingHashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingCheapSSLsecurity
 
Understanding SSL Certificate for Apps by Symantec
Understanding SSL Certificate for Apps by SymantecUnderstanding SSL Certificate for Apps by Symantec
Understanding SSL Certificate for Apps by SymantecCheapSSLsecurity
 
Thawte Wildcard SSL Certificates – Enable Sub-Domains Security
Thawte Wildcard SSL Certificates – Enable Sub-Domains SecurityThawte Wildcard SSL Certificates – Enable Sub-Domains Security
Thawte Wildcard SSL Certificates – Enable Sub-Domains SecurityCheapSSLsecurity
 
Shift to HTTPS and Save Your Website from the Wrath of Blacklisting
Shift to HTTPS and Save Your Website from the Wrath of BlacklistingShift to HTTPS and Save Your Website from the Wrath of Blacklisting
Shift to HTTPS and Save Your Website from the Wrath of BlacklistingCheapSSLsecurity
 
Microsoft Exchange Server & SSL Certificates: Everything you need to know
Microsoft Exchange Server & SSL Certificates: Everything you need to knowMicrosoft Exchange Server & SSL Certificates: Everything you need to know
Microsoft Exchange Server & SSL Certificates: Everything you need to knowCheapSSLsecurity
 
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurityComodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurityCheapSSLsecurity
 
Why Green Address Bar EV SSL Certificates are Critical to E-commerce
Why Green Address Bar EV SSL Certificates are Critical to E-commerceWhy Green Address Bar EV SSL Certificates are Critical to E-commerce
Why Green Address Bar EV SSL Certificates are Critical to E-commerceCheapSSLsecurity
 
4 Major Reasons for Big Organizations to Have Wildcard SSL Certificates
4 Major Reasons for Big Organizations to Have Wildcard SSL Certificates4 Major Reasons for Big Organizations to Have Wildcard SSL Certificates
4 Major Reasons for Big Organizations to Have Wildcard SSL CertificatesCheapSSLsecurity
 
Comodo: The Benefits of EV SSL Certificates - CheapSSLsecurity
Comodo: The Benefits of EV SSL Certificates - CheapSSLsecurityComodo: The Benefits of EV SSL Certificates - CheapSSLsecurity
Comodo: The Benefits of EV SSL Certificates - CheapSSLsecurityCheapSSLsecurity
 
Reduce the Domain Validation time with Symantec Automated Authentication Process
Reduce the Domain Validation time with Symantec Automated Authentication ProcessReduce the Domain Validation time with Symantec Automated Authentication Process
Reduce the Domain Validation time with Symantec Automated Authentication ProcessCheapSSLsecurity
 
Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...
Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...
Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...CheapSSLsecurity
 

More from CheapSSLsecurity (20)

Various Types of OpenSSL Commands and Keytool
Various Types of OpenSSL Commands and KeytoolVarious Types of OpenSSL Commands and Keytool
Various Types of OpenSSL Commands and Keytool
 
What is Certificate Transparency (CT)? How does it work?
What is Certificate Transparency (CT)? How does it work?What is Certificate Transparency (CT)? How does it work?
What is Certificate Transparency (CT)? How does it work?
 
Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017Norton Cyber Security Insights Report 2017
Norton Cyber Security Insights Report 2017
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
Is your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if notIs your business PCI DSS compliant? You’re digging your own grave if not
Is your business PCI DSS compliant? You’re digging your own grave if not
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
How Hashing Algorithms Work
How Hashing Algorithms WorkHow Hashing Algorithms Work
How Hashing Algorithms Work
 
Quantum Computing vs Encryption: A Battle to Watch Out for
Quantum Computing vs Encryption: A Battle to Watch Out forQuantum Computing vs Encryption: A Battle to Watch Out for
Quantum Computing vs Encryption: A Battle to Watch Out for
 
Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22Symantec (ISTR) Internet Security Threat Report Volume 22
Symantec (ISTR) Internet Security Threat Report Volume 22
 
Hashing vs Encryption vs Encoding
Hashing vs Encryption vs EncodingHashing vs Encryption vs Encoding
Hashing vs Encryption vs Encoding
 
Understanding SSL Certificate for Apps by Symantec
Understanding SSL Certificate for Apps by SymantecUnderstanding SSL Certificate for Apps by Symantec
Understanding SSL Certificate for Apps by Symantec
 
Thawte Wildcard SSL Certificates – Enable Sub-Domains Security
Thawte Wildcard SSL Certificates – Enable Sub-Domains SecurityThawte Wildcard SSL Certificates – Enable Sub-Domains Security
Thawte Wildcard SSL Certificates – Enable Sub-Domains Security
 
Shift to HTTPS and Save Your Website from the Wrath of Blacklisting
Shift to HTTPS and Save Your Website from the Wrath of BlacklistingShift to HTTPS and Save Your Website from the Wrath of Blacklisting
Shift to HTTPS and Save Your Website from the Wrath of Blacklisting
 
Microsoft Exchange Server & SSL Certificates: Everything you need to know
Microsoft Exchange Server & SSL Certificates: Everything you need to knowMicrosoft Exchange Server & SSL Certificates: Everything you need to know
Microsoft Exchange Server & SSL Certificates: Everything you need to know
 
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurityComodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
Comodo Multi Domain SSL Certificate: Key Features by CheapSSLsecurity
 
Why Green Address Bar EV SSL Certificates are Critical to E-commerce
Why Green Address Bar EV SSL Certificates are Critical to E-commerceWhy Green Address Bar EV SSL Certificates are Critical to E-commerce
Why Green Address Bar EV SSL Certificates are Critical to E-commerce
 
4 Major Reasons for Big Organizations to Have Wildcard SSL Certificates
4 Major Reasons for Big Organizations to Have Wildcard SSL Certificates4 Major Reasons for Big Organizations to Have Wildcard SSL Certificates
4 Major Reasons for Big Organizations to Have Wildcard SSL Certificates
 
Comodo: The Benefits of EV SSL Certificates - CheapSSLsecurity
Comodo: The Benefits of EV SSL Certificates - CheapSSLsecurityComodo: The Benefits of EV SSL Certificates - CheapSSLsecurity
Comodo: The Benefits of EV SSL Certificates - CheapSSLsecurity
 
Reduce the Domain Validation time with Symantec Automated Authentication Process
Reduce the Domain Validation time with Symantec Automated Authentication ProcessReduce the Domain Validation time with Symantec Automated Authentication Process
Reduce the Domain Validation time with Symantec Automated Authentication Process
 
Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...
Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...
Hidden Dangers Lurking in E-Commerce and Reducing Fraud with the Right SSL Ce...
 

Recently uploaded

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...Sri Ambati
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
 

Recently uploaded (20)

"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Top Information Security Threats of 2016 and Tips to Combat Them

  • 1. Top Information Security Threats of 2016 and How You Can Combat Them
  • 2. A look at the newest threats posed to you on the internet and how you can stay safe.  It’s 2016 and the internet continues to evolve as more and more people and even some inanimate objects come online.  Think about it, you can buy refrigerators and vacuum cleaners that are linked into the internet now. The internet of things, which sounds like a bad 90’s VHS, is very real and continues to grow each and every day.
  • 3.  And with the growth of the internet comes the growth of hacking and cybercrime. Since the advent of the internet hackers have been hiding in the shadows looking to exploit weaknesses for their own personal gain  And despite massive gains on the information security front, cybercrime is always a half-step ahead.  That’s why we’ve compiled a list of some of the biggest Information Security Threats facing us in 2016 along with some tips on how you can stay safe. Some are old. Some are new. But all of them will be prevalent this year and without a little bit of knowledge and a lot of precaution, you could find yourself being victimized by any one of them.
  • 4. Retail Data Hacks  Retail Data Hacks are nothing new. Every year hackers cause breaches to major chains and large internet retailers in the hopes of stealing valuable credit card data that can be sold on the black market or used for personal gain.  From the standpoint of these retailers, it’s important that they encrypt everything and keep the most up-to-date security implementations possible, but as a customer you can take steps to stay safe too.  Namely, you can request a pin and chip card from your bank to replace your traditional debit card. These chip cards are much more secure than their predecessors and can help prevent having your information stolen by any malicious third parties.
  • 5. Mobile Threats  You use your mobile device for everything nowadays. From surfing the internet to checking your bank accounts, mobile devices have become ubiquitous in today’s society. Unfortunately, mobile devices are not always the most secure. There are a number of ways you can stay safe on your mobile device.  For instance, make sure to activate encryption options on your phone. Only download apps from trustworthy sources like the Apple store or Google Play Store. Stay off of unsecure Wi-Fi networks. And most of all, download an antivirus app to scan your phone regularly.
  • 6. Phishing Attacks  Phishing is a practice where hackers send you an email or a link in the hopes of stealing personal information. One of the most common phishing tactics is the infamous “Nigerian Prince” email, in which a hard-on-his-luck Nigerian Prince offers you a large payment if you can just give him some personal information or even a little bit of money to help him get back on his feet.  Nowadays, phishing is much more sophisticated with hackers building entire fake websites aimed at manipulating people into giving away precious personal information like banking numbers or passwords. Unfortunately, there is no silver bullet for phishing. You just have to be vigilant. Never open attachments from unknown senders. Don’t provide personal details on sites that aren’t properly authenticated and, when in doubt, don’t respond at all.
  • 7. Identity Theft  Identity Theft can be the result of any of the aforementioned items on this list. You can lose your identity in a phishing attack, it can be stolen in a data breach or someone could hack your phone. Either way, once your identity has been stolen you really won’t care so much how it happened as how you can fix the problem.  There are lots of tips to help keep your identity safe. From physical tips like always shredding documents with personal information on them, to cyber tips like avoiding suspicious websites and never giving out personal information over unencrypted channels, you can never be too careful.
  • 8. Healthcare Data Hacks  One of the most famous Healthcare data Hacks occurred in 2015 when Anthem was hacked and over 78 million medical records were exposed. If you think about it, the healthcare system is a great access point for hackers because medical records contain tons of personal information, everything from social security numbers and addresses to financial records.  Unfortunately, aside from monitoring the news there’s not a lot you can do to protect yourself from this threat. The medical field is already mandated to use SSL encryption and spends millions of dollars each year on a comprehensive information security strategy. It’s just that sometimes a breach happens.
  • 9. Attacks on Banks  This is another cyber threat that individuals may not be able to do a lot about. Every year the Banking Industry is one of the premier targets of cyber criminals and every year you hear about one or two successful hacking attempts.  This isn’t to worry you though. Banks spend top dollar on security solutions like SSL encryption, threat assessment, malware scanning and all range of other information security products. And thankfully, if you’re in the US, your money is insured by the FDIC.  But that doesn’t mean you shouldn’t be vigilant and stay on top of your accounts anyway—just to be on the safe side.
  • 10. Additional Information Security Tips As we’ve said, some of these threats are capable of being mitigated by you, personally. Others are not in your control. But that doesn’t mean you can’t still take every precaution. Here are five additional tips to help you stay safe in 2016.  1. Use Strong Passwords This one is pretty obvious but you’d be surprised how many people go with something easy to remember (like, say, “password”) instead of something safe. Use passwords that include sequences of numbers, letters and symbols. Your password shouldn’t be easy to guess.
  • 11.  2. Don’t Open Suspicious Emails or Attachments Duh! If you don’t know the sender or the file extension, chances are they’re not safe.  3. Destroy Sensitive Documents We already alluded to this, but if a document contains sensitive information you should probably shred it before disposing of it.  4. Use a VPN to Secure Your Internet Connection if You’re on Public Wi-Fi Public Wi-Fi is notoriously unsafe. Hackers prey on the unsuspecting masses at places like airports and coffee shops. Always use your VPN to add a layer of much-needed security when on a public Wi-Fi network.
  • 12.  5. Keep Your Antivirus Software Up to Date Another obvious tip that many people don’t follow. Sure downloading new updates may be a pain. But in the two minutes it takes you to do it, you’re keeping yourself safe.
  • 13. For More Details on Information Security Threats Blog: cheapsslsecurity.com/blog Facebook: CheapSSLSecurities Twitter: SSLSecurity Google Plus: +Cheapsslsecurity