Posts

Cyber Attacks Increase During COVID-19 Crisis

Cyber attacks and cyber threats have been on the rise as more and more people are working remotely during the coronavirus crisis, according to CNBC.

Many meetings and gatherings have moved to Zoom video calls, which have now been susceptible to attacks called “ZoomBombing.” These attacks hijack the screensharing feature to play graphic videos.

TechCrunch recommends the following safety measures to protect your Zoom calls:

  • Disable “Join Before Host” so only you have control of the call.
  • Disable “File Transfer” to prevent viruses.
  • Disable “Allow Removed Participants to Rejoin” to keep booted attendees out of the call.

Cybersecurity is important now more than ever. Businesses need to be protected from security breeches, and a good cybersecurity system provides a strong line of defense and works to prevent and take down cyber attacks.

Yottability is here to help protect and secure your data from cyber threats.

We provide firewall maintenance and support to block certain network traffic and prevent the spread of computer attacks. We also provide “anti” software, which prevents and destroys viruses and malware.

5 Cyber Security Tips

Protecting your devices from cyber threats doesn’t always have to involve a complete tech overhaul. Simple changes can make a big difference.

1. Make strong, unique passwords for all your online accounts.

This task is actually easier than it seems if you have a system for creating passwords, like this Forbes article explains. You could also try using a password manager to keep track of all your passwords.

2. Learn to recognize and avoid email scams.

The easiest way to prevent phishing attacks is to double-check the spelling of sender addresses and URLs in any emails you receive. Also pay attention to the email’s content. Does the offer/inquiry/request seem too good to be true? It probably is!

3. Be safe with your social media accounts.

Monitor them for activity that seems suspicious. Any evidence of posts/messages/etc you didn’t create is likely a sign you’ve been hacked. Also, be careful to not share too much personal information. Hackers could get access to much more than your basic info depending on what you post.

4. Delete the recordings on your digital assistants.

Enjoy using digital assistants but want to keep your information private? Deleting the recordings made by devices like Amazon Alexa and Google Home. This ensures that your data stays yours.

5. Make sure to do your “sensitive browsing” on secure devices and connections.

Sensitive browsing includes activities such as banking, shopping, or filling out confidential documents. Do these on devices you own and on locked WiFi networks to prevent third parties from getting access to your information.