Show Menu

Cybersecurity Red Flags Cheat Sheet by

security     computer     cyber     flags     red

Introd­uction

For years, hacking focused mainly on stealing computing resources to create for example, botnets. Today, the focus has shifted to stealing the most valuable thing the users have – their personal data. Personal data ranges from names and addresses, to logins and passwords, credit card numbers, Social Security numbers and inform­ation about where an individual is located and what they are doing. Access to this inform­ation not only leads to identity scams but can also jeopardize an indivi­dual’s personal safety as well. In order to build a solid cybers­ecurity system and combat attacks it is important for users to understand common cyber-­threats

Phishing

Phishing attacks appear in two forms, targeting a large number of indivi­duals or focusing on a specific group. Mass attacks aim to deliver malware via automatic download to users’ devices and often come in the form of USB flash drives or infected websites and emails. Targeted attacks come in the form of tailored emails that are disguised as emails from large corpor­ations. Targeted phishing emails often include corrupted links and ask for personal inform­ation or automatic actions.

Social networks

Posts or links to websites that offer an option to sign up through your social network accounts with the click of a button provides hackers with access to your list of friends and your personal inform­ation. What is worse, some malware can be downloaded onto your device without the user’s knowledge. The delivery can take place immedi­ately or with some delay so the victim cannot easily track down the source of the malware.

Infected websites

Some websites can contain malware that utilizes the security holes in browsers. It is impossible for the user to be aware of all possible threats and without the proper security software, and up-to-date operating system and browsers, people are under constant threat.

Public Wi-Fi Networks

Accessing public Wi-Fi networks leaves indivi­duals vulnerable to hackers as these networks can easily be monitored to obtain private inform­ation. By not using an encrypted website when accessing sensitive data, people are simply leaving the door open to hackers.
 

User Service Providers

When creating an account, users provide their personal inform­ation with good faith in their security. Attacks similar to the Target hack and Heartbleed exemplify a hacker’s option to target third-­party mainte­nance organi­zations to gain access to users’ personal data.

Tips

Use strong passwords; mix numbers, upper and lower case letters and symbols
Use unique passwords for each site you use or utilize a password management system that can do it for you
Keep your operating system, security software, browsers etc. up to date
Be careful when asked to click links that you receive in email or social media messages
Treat everything you post as if it will be completely public and never be deleted – everything
Status updates, photos and comments can reveal A LOT about you
On social networks be selective about who you accept as a friend, and be careful about adding apps, plugins or other extras
Always enable the passcode lock on your phone and mobile devices

Download the Cybersecurity Red Flags Cheat Sheet

1 Page
//media.cheatography.com/storage/thumb/davidpol_cybersecurity-red-flags.750.jpg

PDF (recommended)

Alternative Downloads

Share This Cheat Sheet!

Like this cheat sheet? Check out our sponsors!

Readable.io is a collection of tools to make your writing better. More readable content means higher conversion rates and better reader engagement. Measure website and document readability, measure keyword density and more!

Click Here To Get Started!

 

Comments

No comments yet. Add yours below!

Add a Comment

Your Comment

Please enter your name.

    Please enter your email address

      Please enter your Comment.

          Related Cheat Sheets

          More Cheat Sheets by Davidpol

          Ten Essential Aminos Acids Cheat Sheet