Table of contents:

6 Internet security myths that can be expensive to believe
6 Internet security myths that can be expensive to believe
Anonim

If you think that only IT geniuses can hack a computer, you are wrong.

6 Internet security myths that can be expensive to believe
6 Internet security myths that can be expensive to believe

1. Firewalls completely protect the Network

Firewalls, or firewalls, filter network traffic and protect the internal network from unauthorized access. Firewalls can be roughly divided into two types: hardware and software. The router in your home is a hardware router, and the built-in Windows firewall is a software one.

It sounds like having a firewall in itself makes the internal network secure, but this is not always the case. Many do not even update the firmware in their routers. Although these updates may contain security patches that fix vulnerabilities.

A few years ago, a worm called The Moon infected Linksys routers. Fortunately, the manufacturer released a firmware update that was able to stop the malware.

WPS (Wi-Fi Protected Setup) is another known vulnerability in many routers. So far, no one has figured out how to fix it. Manufacturers advise to simply disable this option in the router settings.

A smart move would be to test the reliability of your firewall using ShieldsUP GRC. You can also buy an industrial router. Such routers are much more expensive, but they are more likely to receive updates and do not have WPS or UPnP options (a set of protocols for universal configuration of network devices).

5 reliable firewalls to protect your computer →

2. Antivirus will be enough

Most antivirus programs provide adequate protection against viruses. However, they may not be able to deal with many other types of malware: Trojans, spyware, worms, rootkits, keyloggers, or ransomware viruses.

The Windows operating system has a built-in defender, which has been greatly improved recently. But don't be naive, you still need a third-party antivirus.

Top 10 Free Antivirus Programs →

3. Only professionals can hack a PC

In movies and games, hackers are like evil geniuses who are capable of performing hundreds of mathematical calculations per second. They usually hide in underground lairs or hide under a hood in coffee shops. In reality, everything is not so romantic and cool.

Your computer can be hacked by a tenth grader from the next doorway. Such a hacker - a script kiddie - only needs code and programs written by other people. One of them is called and is designed to detect and automatically exploit known vulnerabilities.

4. Passwords are reliable protection

Passwords remain the cornerstone of internet security. They protect your account from all types of attacks. However, due to errors of large companies, user credentials are made publicly available. Because of this problem, they even created a special website and an extension that check if your password has leaked to the Internet.

To protect your account, come up with a strong password and remember to change it from time to time.

How to create and remember a strong password →

If you don't believe in yourself, install password managers.

Lifehacker's 10 best password managers →

Use two-factor authentication. To do this, you will need an additional device, most often a smartphone.

How to set up two-factor authentication for all your accounts →

5. VPN is the key to anonymity

The idea behind a VPN is to encrypt outgoing traffic. As a result, the user can maintain confidentiality and protect data from hacker attacks. But it's not that simple.

Cisco recently warned of a VPN bug affecting its popular Adaptive Security Appliance software. Thanks to this vulnerability, hackers can reboot the entire system or take full control over it.

A VPN will help you bypass site blocking and protect your data when connected to public Wi-Fi hotspots.

But it is unlikely that it will be possible to completely hide user activity or avoid other types of attacks.

Remember that you can get access to information through a VPN in the event of an IP or DNS leak. In addition, the VPN data can be decrypted by government services.

What is VPN →

6. HTTPS is always secure

Internet security. HTTP and HTTPS
Internet security. HTTP and HTTPS

Many sites have successfully circumvented this vulnerability by using 2048-bit encryption keys instead of 512-bit ones.

If you are in doubt about security, check the web page using the service.

Hackers always have an answer to the next security patch. This war can only be won if you take responsibility into your own hands.

This does not mean that you have to spend your entire salary on expensive equipment. First, make sure your accounts are secured with strong passwords and that your router has the latest firmware.

Recommended: