Common Security Myths

Common Security Myths

Myth (noun) – An unproved or false collective belief that is used to justify a social institution

Use strong passwords and don’t go to sketchy websites, and you’ll protect yourself online, right? Well… That’s a good start. But it’s not quite that simple.
The internet is evolving and so too is cybercrime.

Myth vs Reality:

Myth 1: Firewall + antivirus = total protection
Reality: Antivirus software and a firewall make it difficult for an intruder to get their hands on your information, but you also need to take protective measures. Free only offers basic antivirus and doesn’t have antispam, web filtering and behaviour analysis. Keep your software up to date and patched against vulnerabilities. Combining these technologies with good security habits is the best way to reduce your risk. Remember to lock or log off your computer when leaving your desk, even for a moment.

MYTH 2: Private browsing” is always private
Reality: Surfing the web in private (or incognito) mode prevents the browser — like Chrome, Firefox, and Internet Explorer — from collecting data about your activities. But it doesn’t hide your browsing from your internet service provider and the websites you visit. It also doesn’t hide your IP addresses from web servers and online snoops. Private hides your history from other users on the same computer but it will be tied to your computer.

 

 

 

 

MYTH 3: Infected computers display nasty messages and are very slow.
Reality: The most dangerous hacker is not the one who wants to put a joke or a skull on your screen; it’s the one who stealthily works to take control of your computer and cause damage to your equipment or steal information they can use for their benefit. This type of hacker works to ensure that their activities are not noticed by you.

MYTH 4: I don’t go to dangerous sites, and I check my links, so I’m safe.
Reality: Your browser is the biggest vulnerability. Most recent attacks take advantage of weaknesses in browser-related technologies to compromise your system. By simply visiting a compromised website may be sufficient to allow an attacker to gain control of your system. As if this weren’t bad enough, many legitimate sites are compromised and become sources of infection. Avoid accessing the web from protected systems behind your firewall.

Myth 5: Cyber security? Just leave it to the IT department

Reality: Cyber security is a business risk, not just an IT problem. Setting up the proper technology tools to provide cybersecurity protection are necessary. Organizations, management and staff need to adopt and extend these policies to establish a unified security posture. Staff need to be trained, educated and aware of security risks. Implementing appropriate technical controls to safeguard the information that an organisation holds is the first line of defence against security threats.

Myth 6: My Wi-Fi is unhackable if I hide it
Reality: Most routers give you the option of making your network ‘invisible’. This leaves people believing that since no-one can see their network, no-one on the outside can hack their connection. If someone wants to hack your Wi-Fi, it is quite likely that they have the technical competence to know that most networks are hidden and the know-how to make them visible even though you have hidden the network name. Keep older routers up to date, use strong passwords and check your routers manual to learn how to enable WPA2 wireless encryption on your router.

 

Conclusion

The bottom line is IT security must be a priority for your business, no matter the size of your operation. Based on your industry and security needs, you can work with professionals to customize the appropriate level of coverage for your company. It’s important to remember to apply patches and upgrades and upgrade in a timely manner, but that will only carry you so far. The weakest link in security is still the human element.

Sources:

 

If you are interested in becoming one of our subscribers, please visit our website.
To view notes with screenshots on how to use our website, please visit our Wiki site.
To view more articles, please visit our blog.

About Chantélle Naudé

I have been with Leads 2 Business since 2009, from Leads 2 Quotes to Directory. Mom to 3 girls. Outspoken, Fastidious and lover of all things Spicy and Shiny.

Featured Tender: Supply and installation of security equipment X-ray Machines and Walk through Metal Detectors

.Supply and installation of security equipment X-ray Machines and Walk through Metal Detectors

Contract Number:

SENT/043/2017-18 – Sentech Soc Ltd

Description:

Supply and installation of security equipment X-ray Machines and Walk through Metal Detectors

 

Description:

Category Industries
 Security & Fire  Institutional
Region Site Inspection
 Gauteng  A compulsory session will be held on: Date: 05 April 2018 at Time: 11:00. Venue: Sentech SOC ltd, Octave Street, Radiokop Ext.3, Honeydew. Bidders must attend compulsory briefing session to be able to participate in this tender.
Closing Date Restrictions
 19 April 2018 at 12:00  The prequalification criteria applicable for this tender is BBBEE level of 1 to 4. Proposal must be physically delivered. Faxed or Emailed proposals will not be accepted. No Late submission will be accepted.

 

 

 

If you are a valued Tender subscriber, you can find more details about this Tender here
If you are interested in becoming one of our subscribers, please visit our website.
To view notes with screenshots on how to use our website, please visit our Wiki site.
To view more articles, please visit our blog.

 

About Claire Donaldson

I started working at Leads 2 Business in February 2005, and have served as Head of Department of Daily Tenders from 2007 until the present. I oversee both the Daily Tenders South Africa and Africa Departments.

Featured Tender: Appointment of a Service Provider to Render Physical Alarm and Armed Response Security Services for the Independent Police Investigative Directorate in all Nine Provinces

Appointment of a Service Provider to Render Physical Alarm and Armed Response Security Services for the Independent Police Investigative Directorate in all Nine Provinces

Featured Tender

Description:

Bids are hereby invited for the following: Appointment of a Service Provider to Render Physical Alarm and Armed Response Security Services for the Independent Police Investigative Directorate in all Nine Provinces for a Period of Three (03) Years. Required at: National: Independent Police Investigative Directorate: Auxiliary Services.

Contract Number:

IPID02-17/8 – Independent Police Investigative Directorate

Category
Industries
 Security & Fire  Institutional
Region
Site Inspection
 South Africa  Meeting/Briefing Session:Briefing Session held on 23 March 2018 at 10:00. Venue: 7th Floor, 114 Madiba Street, City Forum Building, Pretoria.
Closing Date
Restrictions
 03 April 2018 at 11:00 Documents should be perfectly binded and Write the Bid Number on the Envelope. Late submissions will not be accepted.

 

If you are a valued Tender subscriber, you can find more details about this Tender here
If you are interested in becoming one of our subscribers, please visit our website.
To view notes with screenshots on how to use our website, please visit our Wiki site.
To view more articles, please visit our blog.

 

About Claire Donaldson

I started working at Leads 2 Business in February 2005, and have served as Head of Department of Daily Tenders from 2007 until the present. I oversee both the Daily Tenders South Africa and Africa Departments.

General Safety in South Africa

Leads 2 Business : Safety

Crime in South Africa, like many other places in today’s world, can be a problem. Despite some negative perceptions about crime in South Africa, it’s generally safe & friendly, all you need to do is take sensible precautions & follow some general rules in order to stay safe.

 

Personal Safety Tips

  • Be aware of your surroundings
  • Avoid unfamiliar areas & walking alone
  • Avoid wearing/displaying valuables & large amounts of money
  • Take ATM Safety precautions
  • If you travel inform someone of your destination
  • Ensure that you know relevant emergency numbers
  • In a robbery situation, remain calm & do not resist
  • Take a self defense course
  • Don’t leave animals in the car
  • Trust your instincts at all times

 

Home Safety

  • Fencing & Gates
  • Alarm, CCTV & Intercom Systems
  • Dogs
  • Security Lighting
  • Ensure gates are locked at all times & keys/access devices are in a designated area

 

Vehicle Safety

  • Keep doors locked & windows closed
  • Do not leave valuables locked in the car
  • Park in well-lit places
  • If something seems suspicious, rather drive away
  • Vary the routes that you take & do not give strangers a lift
  • Ensure you have sufficient petrol
  • If you are in a road accident, drive to the nearest police station
  • Have your keys ready before approaching your vehicle
  • If you feel you are being followed, rather drive to the nearest police station

 

Safety Tips Unique to SA:

  • Look out for potholes
  • Beware of animals on the road & other native creepies and crawlies
  • Swimming in rivers can be dangerous due to hippos, crocodiles & bull sharks
  • Take Malaria precautions (repellents, nets)
  • Take Tick precautions (to prevent tick-bite fever)
  • Avoid drinking water from Rivers (Bilharzia & Cholera)
  • Sun protection (even on a cloudy day)
  • Beware of Remote Jamming
  • Beware of Taxi’s while driving/ walking
  • Keep updated on Load-shedding Schedules & take pro-active measures

 

Although it seems like you’ve just been handed a mountain of Safety Tips they are not there to prevent you from enjoying life. Keep them in mind & make them part of your daily routine & they will become effective habits before you know it.

Think of it like Dr George Cui, “Safety First, Then Healthy, then Happy, then Wealthy.”

 

P.S. Please add your Safety Tips in the comments section below.

 

Further Reading:

https://www.travelground.com/blog/10-ridiculous-commonly-asked-questions-south-africa/

 

 

 

 

About Sasha Anderson

Millennial Mom + wife living the hash-tag life. Reach out if you want to talk: L2B, social media, construction, technology, marriage, parenting, popular culture and travel. Remember: If You Fail - Fail Forward

1 2