Manila Bulletin

Fortinet offers cyber-safety tips amid escalating cyber attacks

-

Fortinet warns businesses and individual­s in the country to brace for escalating cyber attacks as cyber-criminals expand their targets to home network devices and mobile devices. Fortinet’s latest Global Threat Landscape Report for Q2 2017 revealed that 90% of organizati­ons recorded attacks targeting system and device vulnerabil­ities that were at least 3 years old, even though updates and patches that corrected those vulnerabil­ities had long been available. Even more alarming, about 60% of organizati­ons reported successful attacks that had targeted vulnerabil­ities that were 10 or more years old. A growing percentage of such attacks also target home network devices, such as routers and wireless access points. And 1 in 20 of such attacks today target mobile devices, such as Android-based smart phones and tablets.

“We have all learned to lock our cars, deadbolt our doors, look both ways before crossing the street, and avoid dark alleyways and streets at night. It is time to develop the same good habits as we navigate through our digital environmen­t,” said Anthony Giandomeni­co, senior security strategist/researcher, Fortinet.

Control Your Social Media. Be careful who you “friend” on your applicatio­n. Cybercrimi­nals often set up fake pages or accounts and request to be added as a friend.

Scrutinize Your Online Transactio­ns. Your bank will never initiate a request to verify your account or provide your login credential­s. Such requests, either online or via email, can safely be ignored or deleted. Should one receive an email or a browser page with a link attached, always look at the URL before you click it. Hover over the link and look at the address that shows up. It should start with a real address, such as “www.(yourbank).com”. The address should also be reasonably short. To remove any doubts, simply log into the site directly rather than use the link provided, or call your financial institutio­n to ensure that the request is legitimate.

3. Inspect Your Email. The most common way to get users to load malicious software or malware onto their systems is through an email attachment. Known as phishing, these attacks often claim that the file attached to your email is a receipt or bill for a fictitious transactio­n, a fake document that needs immediate attention, or a message from a friend or family member. NEVER click on an attachment or web link in an email from someone you do not know, that you did not request, or that does not seem entirely legitimate.

A quick way to check the validity of an email is to simply look at the email address of the sender (you can do that by double clicking on the name of the sender or by hitting reply.) Does the email match the organizati­on? Is it especially long, from a different organizati­on or location from what you expected, or does it include strings of letters or numbers? If so, you can safely delete it.

4. Update Your Devices. Review devices in your home that are connected to the Internet. These should include phones, DVRs, TVs, security cameras and other online devices, and even home routers and wireless access points. Write down the names of the manufactur­ers and the model numbers, and list all the software running on these systems. Once you have a complete inventory list, search for known vulnerabil­ities or patches, and make sure that these devices and applicatio­ns are running the latest patches and the most current versions of their operating systems, firmware, or software. If a device or applicatio­n is no longer supported by the manufactur­er, the safest thing to do is to replace it.

Newspapers in English

Newspapers from Philippines