MIL OSI Translation. Region: Russian Federation –
April 6, 2021, 18:37
To prevent personal or corporate information from scammers, it is important to follow a few simple rules.
April 7 is considered the birthday of the Russian-speaking Internet. On this day in 1994, the .ru domain was registered. Over the past 27 years, the Internet has penetrated all areas of life and business. Today, almost everyone uses it: according to a study by Mediascope, in 2020 more than 87 million people in Russia went online every day – more than 70 percent of the country’s population.
Experts on Runet’s birthday Department of Information Technologies of Moscow talked about the simple safety rules that must be observed on the Internet.
“Explaining and helping residents understand the rules of Internet safety is one of the most important tasks that Moscow, as one of the most technologically advanced cities, sets itself. In the capital, webinars on information security are regularly held for both the older generation and adolescents. They are the most active users of the global network. It is important not to prohibit and control, but to teach children to independently analyze information, treat it critically and evaluate its benefits. As a result, Internet safety rules should become as familiar as traffic rules, ”said Artem Kungurtsev, head of the information security department of the Information Technology Department.
Relevant for everyone
To register on any Internet resource, passwords are required. And the more complex they are, the more reliable – the more likely your data will not fall into the hands of third parties. A correct password from a security point of view consists of at least eight characters, including uppercase and lowercase letters, numbers, and other symbols. Such a password will contain no personal information and no obvious words, phrases and character sets.
It will even more secure the connection of two-factor authentication in services, by hacking which you can get access to banking applications, mailboxes and social networks.
Many sites use cookie technology to track user preferences. However, there are drawbacks in it, with the help of which you can also log into someone else’s account. Therefore, for greater security, it is important to clear the browser of cookies. This can be done both using standard browser tools and through special programs.
Before leaving personal information on the site, you need to check the level of its protection against hacker attacks. For several years now, most companies have chosen https technology to protect their sites. However, there are still sites that use the outdated http methodology, which can provoke intruders. Therefore, it is important to pay attention to the site address: in a potentially dangerous version, the image of a closed lock will not appear in the address bar, or the lock will be crossed out.
New opportunities for fraudsters have emerged with the proliferation of video conferencing services and cloud solutions. Ideally, online meeting software should support end-to-end encryption. It encodes the content in such a way that only the participants in the conversation can recognize it. You can check the presence of the cipher in the service settings.
Special passwords will also help to exclude unwanted connections during video conferencing. When demonstrating your screen, you only need to show the file that is being discussed. If this is a work document or any other important document, it is better to send it to colleagues in person. Another important rule is not to start a conversation until the attendee list has been checked, and also not to record meetings – it is almost impossible to control the access of strangers to such a recording.
Configuring access restrictions will help you secure data in cloud services. Documents that don’t need to be co-edited are safer to be encrypted. In addition, confidential information such as passwords should not be stored on cloud resources.
Browsers can not only collect cookies, but also store passwords and payment methods. And scammers are very interested in this data. Therefore, experts do not recommend saving account passwords and banking data. It is better to enter information for transactions manually, and use a special manager for passwords.
Personal data is also collected through phishing links disguised as standard ones. In order not to fall into the trap, you should not open letters from unknown addressees and follow the links inside. It is dangerous to download files from unknown or incomprehensible sources – they may contain malicious software.
The internet is often described as an insecure environment for older people. Many of them are still inexperienced users and more than others are at risk of facing scammers. To help them feel more confident on the Web and recognize potential threats in time, the IT Department specialists regularly conduct training webinars. Participants are told about the methods of protecting personal data and the importance of so-called digital hygiene.
The main threat to children on the Internet is inappropriate content. Therefore, the task of parents and the state is to protect them from negative or potentially dangerous information. Special settings in browsers and antivirus programs with advanced functionality help to do this.
Mobile apps are also regulated by law. There, these issues are resolved through registration and restriction of access to all or individual functions. Parents themselves can also restrict the installation of applications or install versions specially designed for children (for example, some video hosting sites have such versions).
It is extremely difficult to protect children from unnecessary information on social networks and instant messengers. This is a common task for developers, authorities and parents themselves. It is important to explain to children why they need to be careful and what to pay special attention to, teach them to analyze information and make decisions on their own.
EDITOR’S NOTE: This article is a translation. Apologies should the grammar and or sentence structure not be perfect.