Cybercrime and Your Personal PC

One of the most critical things to look for in a cyber crime report is how one can protect themselves from harmful activity. Whether you are tech savvy or not, no one wants to be a sitting duck for the next big risk.

Next generation technology continues to transform, exposing residences and businesses to both opportunities and threats. Online crime is a growing concern and new technologies will of course be viable targets (after all, nothing is invincible).

The impact of a cybercrime causes compromised information that can be both emotionally and financially traumatic – a truly boundless threat.

A quick 2016 cybercrime report

Online crime today, ranks as the second most reported economic crime. Recent Microsoft Security Intelligence reports indicate that 40% of US households are affected by computer viruses. Amazon.com, followed by Apple and eBay have been some of the most exploited targets of phishing attacks, and although computer virus writing is not considered illegal in the US, roughly 82,000 new malware threats are discovered daily. When you think about it, it only takes 82 seconds for someone to become the first victim after an initial threat is released.

How to prevent cybercrime

Do not let your digital guard down. Whenever you use your computer, smartphone or tablet, recognize it is more than just a remote source to send and receive information. These devices serve as repositories for confidential and private information that you absolutely do not want to share.

Here are 3 tips to stay ahead of the bad guys and to prevent your device from falling victim to cybercrime:

  • Differentiating harmful scams from innocent communications. There are millions of situations that can put your PC in harm’s way. Today, there are three serious malware attacks that you may or may not know about.
    • Digital extortion: Cyber criminals are increasingly blackmailing victims and surging ransomware attaches. To put it simply, the hacker steals files or photos from the victim’s computer and demands ransom.
    • Sophisticated attaches: when hackers breach networks with a specific target they encourage a download of an image, software update, install or other type of download that takes you by surprise. As a rule of thumb, don’t click. If you receive an alert or warning pop-up from “Microsoft” or “Google” think before you click to be on the safe side. Analyze website addresses and avoid sketchy websites. Avoid opening suspicious emails and interacting with the receiver via email if you are weary. On top of that, allow the administrator account o our device to be a secondary source for checking emails, browsing the email and so forth
    • Social Media: By liking or sharing a sketchy source’s video or story with your friends, you could be spreading a potential attack waiting to happen. Be careful not to reveal detailed or too much personal information on any social media post.
  • Password security. Never use the same password for multiple accounts. Come up with a password that is otherwise meaningless, and don’t use that password for longer than 30 to 60 days, changing it at irregular intervals. Keep a list and have a back-up of that list.
  • Perform regular maintenance. There are many tasks associated with completing a regular, but thorough maintenance job. Here are just a few suggestions to get you started:
    • Back up files regularly and keep recent backups off-site.
    • Consider installing Microsoft Office Viewers.
    • Regularly update the operating system and patch, patch, patch other software, anti-virus and anti-malware and applications.
    • And more!

The key to preventing malware is being educated and aware. Use this information as your personal cybercrime guideline that you can use to prevent cybercrime from day one. For additional assistance from an expert technician, call Geeks on Site today!

Get in Touch Today

Say goodbye to your home or office tech troubles today. Reach out anytime!