These are the rules for computer and online safety in 2021.
Only your vigilance will protect you against bad guys. You will be safe if you are cautious. Stop and think before you click on links, before you call unfamiliar phone numbers, before you install programs, and before you fill in passwords.
The rules cover these categories.
|Most security attacks begin with a link in a legitimate-looking email message. Do not click on links unless you are 100% certain they lead somewhere you want to go.|
The links lead to real-looking websites that ask you to type in one of your passwords or a credit card number.
For example, many fake messages use Microsoft or Office 365 logos to give them a veneer of authenticity. If you click on the link, it leads to a web page that looks like a Microsoft login screen.
If you fill in your password or credit card number on a fake login screen, the bad guys will capture it.
Only your paranoia can protect you.
|Always hover over a link before you click on it. Do not click unless it is obviously a legitimate link.|
|If you get a malware message by email and you don’t click on a link, it hasn’t hurt your computer. Delete it.|
When you hover over a link, you can see where it leads. (In Outlook a small window pops up; in Chrome it appears in the lower left.) Don’t click if the link doesn’t match the company that you expect. If it is a shortened link and you can’t tell where it goes, assume it is suspicious.
|The bad guys can make the sender’s name and email address appear any way they choose on a malicious message.|
A message might be malicious even if appears to come from a friend or colleague – and it doesn’t necessarily mean they’ve been hacked.
|If you get an email message asking “Are you available,” it is a scam.|
“Are you available” messages are a scam. Your email response will go to a criminal.
The next message will ask you to stick to email. (“I’m in a meeting”).
Then the bad guy will try to convince you to do something you will regret – click a link to install a virus, send money via wire transfer, or buy gift cards and send the info to cash them by email.
|The bad guys know where you live. The bad guys know your old passwords. But the bad guys do not have a video of you looking at porn. They’re lying to scare you.|
If you get an email asking for money and threatening to release an embarrassing video taken with your laptop camera, it is a scam. There is no video. The bad guys don’t have your address book. They won’t contact your family. The latest messages include a password that you recognize or another bit of personal information to make the scam seem more believable. Don’t be frightened.
|Do not click on a link to a file in Google Drive, Dropbox or other online services unless you know with 100% certainty that the file is something you want.|
Many attacks appear to be a link in an email message to a PDF or other online document. The links lead to poisoned websites or fake login pages that will capture your password for the bad guys.
|Never, never, never open email attachments unless you know with 100% certainty that the attachment is something you expected and want to receive.|
This is important. Email attachments are still the primary method of spreading viruses and ransomware. If you open the wrong Word document or PDF, you can take down your entire company. Don’t open email attachments!
|Just because something is listed in a Google search doesn’t mean it is safe.|
Make a judgment about where you’re going before you click.
|Choose passwords carefully.|
Your passwords are your defense against identity theft, financial loss, compromised computers, and breaches of confidentiality and privilege. If you use a weak password, or if you use the same password over and over every time something calls for one, you are jeopardizing yourself and your business.
|Use a different password for every site.|
This is the most important security practice you should adopt in 2021. When large companies are hacked, the bad guys immediately test the hacked passwords on other sites in case you used the same one somewhere else. There is a tip here for creating unique passwords that you can remember.
|Use a password manager for your online passwords.|
If you use a password manager, periodically run its Security Challenge and update any weak and duplicate passwords.
If you don’t use a password manager, Google Chrome will suggest complex, unique passwords and save them to your Google account. If you do that, fiercely guard your Google account password!
|Consider using two-factor authentication.|
Two-factor authentication combines a password and a second check, typically a code sent to your phone in a text message or a number generated by an app on your phone. Many services are adopting two-factor authentication and it drastically improves security. It’s more difficult to use than a simple password, but it’s much less trouble than being hacked.
I recommend Authy for two-factor authentication.
|Back up your computers.|
Choose a backup strategy, understand how it works, and keep your backups up to date.
But it’s worth noting that if your files are stored in OneDrive, Dropbox, or Box, those services provide ransomware protection that may help you recover from an attack.
You may also want to have a local backup to an external hard drive or NAS. Windows 10 users can use File History, but Microsoft is slowly deprecating it in favor of OneDrive.
|If your computer displays a message while you are browsing the Internet claiming that you have been hacked or infected with a virus, it is a lie by criminals.|
Your computer is not infected with anything and you did nothing wrong. If you cannot close the window, close the browser window with task manager or shut down your computer by holding the power switch in for 15 seconds. If your browser asks if you want o go back to the site where you left off – don’t do that! If the message continues to appear, contact your regular IT support for help.
|Do not call the 800 number for “tech support.”|
You are calling criminals who will lie to you.
|If you call the 800 number and give them a credit card number, you will be charged hundreds of dollars for nothing.|
The card number is effectively stolen and you will have to cancel it.
|If you call the 800 number and give them remote access to your computer, you can never trust that computer again.|
The bad guys can do anything once they have remote access – install viruses or keyloggers, download your files, or set up remote access to use in the future. You may have to wipe out the hard drive and reinstall everything from scratch. If your personal information is stored on the computer – passwords, tax information, bank account info, social security number, etc. – you should consider taking steps to protect yourself against identity theft. That might include a fraud alert in your credit report, freezing your credit report, and monitoring your credit report and financial accounts for unauthorized activity.
|Do not run Windows 7.|
Microsoft has ended support for Windows 7. It is no longer going to be kept up to date or secure.
|Set a PIN code, password, or fingerprint authentication to unlock your phone or tablet.|
Smartphones and tablets are easily misplaced or stolen.
|Review the apps on your phone to see if they have permission to do anything unnecessary.|
Apps on your phone may have permission to use the microphone or camera, to track the phone’s location, to access your contacts, or to send SMS messages. Legitimate, well-known apps will use those permissions responsibly. Malicious apps can abuse those privileges and might be monitoring your activity or selling your personal data. Periodically look at the apps on your phone; uninstall the ones that aren’t important and turn off permissions that don’t seem to be necessary.
On Android, go to Settings / Apps & notifications / App permissions. You can group apps by permission and disable a permission for an app if appropriate.
On iPhones and iPads, go to Settings / Privacy. You can choose each permission and disable it with the slider.
|Antivirus software barely slows down the bad guys.|
Windows 10 has built-in antivirus and security protection – look in Settings / Update & Security / Windows Security. It provides strong protection and is sufficient for most people. There are also security programs from Norton, McAfee, and others, of course, but they are not recommended; most of them are poorly written and cause more problems than they solve.
The bad guys been finding ways to avoid antivirus software for 20 years. Nothing on your computer will stop you from typing your password into a fake site run by criminals.
Don’t assume that antivirus software will protect you. Use your common sense. Be cautious when clicking on links. Don’t open unexpected email attachments. Read and think before you click OK.
|Don’t add unnecessary browser extensions or notifications. If a website asks permission to show notifications, always say No.|
Adware has started to turn up again, using Chrome extensions and notifications as a way to display annoying ads and sometimes to track you or steal your personal data.
Extensions are small programs that customize the Chrome browsing experience. Periodically check your extensions and remove anything unfamiliar. In Chrome, click on the three dots in the upper right corner / More Tools / Extensions.
To turn off unnecessary notifications in Chrome, click on the three dots on the upper right corner / Settings / scroll down and click on Advanced / Content settings / Notifications.
|Don’t download “free” programs.|
Adware is distributed with “free” games, PDF programs, media players, and even with quite legitimate utilities like Acrobat Reader. Your security program will not stop you from installing adware, but adware can bring down your computer just as thoroughly as malware from bad guys.
|Do a custom install of any new program and decline unnecessary extra software.|
When you’re downloading and installing a program – especially a free program – scrutinize every screen that comes up. Look for checkmarks that can be unchecked. Look for weasel words that might conceal a disclosure that other programs are coming along. Always do a custom install and study the options.
|Review the apps connected to your online accounts.|
You have probably used your online accounts to sign up for apps and web services. Those apps and services may still be connected to your personal data and selling it to advertisers or worse. Periodically go through the list and disable any that aren’t necessary.
Facebook – click on Settings / Apps
Twitter – click on Settings & privacy / Apps
|Microsoft does not call to fix your computer.|
There continue to be waves of fraudulent phone calls from criminals trying to steal your credit card and install malware on your computer. The scammers play on our fears about online security, just like the poisoned web pages that bring up phony onscreen security warnings. Don’t lower your defenses!
|Don’t answer the phone if you get a robocall.|
A 2018 report said that more than half the calls to mobile phones are robocalls.
If you don’t recognize the caller or the phone number, don’t pick up. If you pick up, the number will be marked in the robocaller’s database as belonging to a live person and you’ll get more calls. If the voice message says to pick up and press a number to be put on the Do Not Call list, do not pick up and press the button. They’re lying about the Do Not Call List.
|Robocallers can make the Caller ID display any name or number they want.|
“Neighbor spoofing” is the term for calls that appear to be from your area code. The bad guys are using data analysis of information about you obtained from hacks or public records or guesswork to fool you into picking up the phone. You might get a call whose caller ID makes it appear to be your insurance agent or your doctor; there’s no way for you to know the name was faked unless you hang up and call the office back directly.
|If you answer the phone and there’s a pause of half a second or so, hang up.|
The call is almost certainly from a scammer or telemarketer; the pause happens as the automated dialer hands off the call to a person in a cubicle
|If you answer the phone and it turns out to be a scammer or telemarketer, hang up.|
Don’t say another word. Don’t engage them. Don’t tell them they should be ashamed. Don’t explain why you’re hanging up. Don’t teach them a lesson by putting them on hold so their time is wasted. Don’t yell at them through a megaphone to hurt their ears. Don’t say any unnecessary words. Just hang up. You won’t hurt their feelings. They are underpaid workers in a cubicle. They’re not judging you.
|Do not approve a wire transfer without verbal authorization.|
One of the worst scams for businesses starts with a targeted email. Bad guys research your business and craft a fake email asking the CFO to send a wire transfer. The request will appear to be legitimate. The bad guys might register a confusingly similar domain name to carry out the scam. They’ll intercept email and send responses that appear to be legitimate. If you authorize a wire transfer to bad guys, you have no recourse against the bank – and the bad guys are long gone with the money, of course.
Educate employees about the risk of wire fraud phishing schemes.
Set up a strict business protocol that a wire transfer cannot be approved without verbal authorization from someone known to the person approving the transfer.
Be careful out there!