Physical protection takes physical solutions. Backups protect you against file corruption, ransomware, and beer spills. Back up the data you can’t live without on a external hard drive. (And if you’re reading this in the bathroom, don’t leave your phone sitting on the TP dispenser.) Back it upįirst things first. Here are some things to do before and after you lose your devices. It’s much easier to guess than you think.īut enough with the scare tactics. And don’t count on your iPhone’s passcode saving your data. All it takes is the wrong person finding your device to make identity theft part of your college experience. A sizeable number of student phones never make it home from the house party or sporting event. However, brazen thievery is only one physical cybersecurity threat. And that’s just the ones that are reported reported. It’s decision time…Įvery year an average of 11,000 robberies and burglaries occur on college campuses. Your legs involuntarily cross as the pressure builds. You spy a sketchy-looking lurker in the corner of the room. “You’re not thinking about leaving me alone are you? ” it seems to ask. Now, all that java is making its way through you. You’re exhausted from trying to BS your way through the last three hundred words of your English 1113 essay. It’s late, and two double Americanos haven’t kept your eyes from glazing over. Getting rich is only one part of the equation. There are probably as many motivations for hacking as there are hackers. Still others, like “ethical hackers” fight against government overreach, corporate greed, or attempts to stifle freedom of speech. Those with political agendas hack elections or campaign emails. Hackers with an anarchist bent just want to watch the chaos erupt when the electrical grid goes down. Yes, making money motivates many hackers, but many do it for other reasons. “Cybercrime is all about making money.” - super duper false How much would you pay to not to have them turn to digital vapor? The more emotionally connected you are to your data, the more valuable it is to a cyberthief. Consider that online video game character that’s taken you four years to perfect. Hackers can also use your personal data to extort money from you. These nefarious digital ninjas can use your stolen personal credentials to apply for a new credit card or banking account in your name. You’re social security number alone is worth loads of cash to a hacker who can sell it on the dark web to identity thieves. “I don’t have anything worth stealing.” - uber false #SCHOOL FOLDER FACTORY PHISHING EMAILS UPDATE#By unplugging, you create update lag times when your devices are more vulnerable to cyberattacks. They can’t update if they’re not connected to the internet. #SCHOOL FOLDER FACTORY PHISHING EMAILS SOFTWARE#You’re devices need updates to their operating systems, apps, and antivirus software to keep them secure. But this actually makes you less safe over time. You might try the “air gap” approach by disconnecting from Wi-Fi when you’re not online. Let’s be honest, it’s impossible to disconnect from the internet and still graduate. “I can just unplug from the internet.” - mostly false If your device gets sick, chances are it’ll infect others. Computer viruses work like real biological diseases. But cybersecurity is everyone’s responsibility-simply because it’s also everyone’s problem. Yes, the IT guy keeps the network from crashing, thwarts hack attacks, and counters data breaches. “The IT department takes care of cybersecurity.” - mostly false Let’s debunk them first before drilling down to the truth. Lies, half-truths, and distortions around cybersecurity are as plentiful as cat videos on YouTube. These are real consequences of cybercrime-they can happen to anyone from 8 to 80. Computer viruses can delete your term paper, hackers can hijack your Facebook account, cyberthieves can steal your identity, and vengeful exes can ruin your reputation. Learning good cybersecurity habits is as important to your college experience as the groups you join or the classes your take.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |