Publishers of technology books, eBooks, and videos for creative people

Home > Articles

  • Print
  • + Share This
This chapter is from the book

Security To-Do List

Malware isn’t going away, so your best bet is to be well-prepared to deal with its potential attacks and aftereffects. As more people use the Internet to shop, bank, play games, socialize, and work, there are even more opportunities for cybercriminals to make a fast buck at others’ expense.

Having read this chapter, you should be better able to spot and avoid different types of malware. Here are a few tips to remember as you read on:

  • Implement a layered defense that includes firewalls, antivirus, and anti-spyware software, intrusion prevention systems, intrusion detection systems, and anti-phishing software.
  • Keep systems and browsers updated with the latest patches. This helps prevent malware from infecting a computer, and also prevents existing malware from spreading across your networks.
  • Monitor and quickly resolve any vulnerability that affects the programs and applications installed on your computer.
  • When using social networks, be careful not to share too much information. If you’re required to enter private data like an email address, select the option to prevent other users from seeing the information, to ensure that no one but you and the website administrator can access your data.
  • Don’t rely on a single operating system (OS) or browser. No OS or browser can be completely secure. By diversifying your OS and browser strategies, you ensure that your entire business won’t be taken down by a single malware attack.
  • Exercise caution when using smartphones, laptops, and mobile tablets to conduct business transactions. Being an online merchant is often a 24/7 job, which tempts some merchants to blur the lines between personal and business lives, and so expose their business data over unsecured personal-use mobile devices.

Next up in Chapter 5, “Steer Clear of the Social Engineer,” we’ll cover how to protect against major “social engineering” threats to your online business security.

  • + Share This
  • 🔖 Save To Your Account

Related Resources

There are currently no related titles. Please check back later.