The rising problem of cybercrime

The rising problem of cybercrime
MARCO_PIUNTI/GETTY IMAGES

Cybercrime is a massive problem that doesn’t look like it’s going to get better anytime soon. Cybersecurity Ventures’ latest annual report estimates that cybercrime will cost the world $10.5 trillion annually by 2025. That staggering figure takes into account a multitude of factors, including stolen money, lost productivity, restoration and the deletion of hacked data and systems.

And cybercriminals don’t only go after big organisations. “The victims of cybercrime involve individuals, organisations and businesses alike – virtually everyone from all walks of life,” explains the experts at SSLStore.

There are ways to protect yourself from cyberattacks, but unfortunately, there isn’t one all-powerful tool that does everything. “The right way to think about computer security is to liken it to Swiss cheese. Any slice of Swiss cheese is full of holes, but if you layer another slice on top of the first one, they cover up each other’s holes a bit,” Roger Thompson, founder of Thompson Cyber Security Labs, tells Reader’s Digest. “Two or three more layers and all the holes are covered up.”

Here are some of the best practices of people who have successfully avoided becoming victims of cybercrime.

Advertisement

They never shop on a website with an “http” URL

They never shop on a website with an “http” URL
CONSTANTINOSZ/GETTY IMAGES

“Only transmit personal data on websites that are https. The ‘s’ indicates a higher level of security. Nowadays, all the reputable e-commerce sites are https – including Amazon and Google, plus the major airlines, banks, car rentals, hospitals, social services and hotel chains. Most scam sites, however, are http (no ‘s’ at the end), because http sites are cheaper than https sites. So, if you receive an email solicitation to use at a website that’s http, be extra careful. It could be a fraud attempt.” — Monica Eaton-Cardone, COO of Chargebacks911.

They only use trusted apps

They only use trusted apps
LJUBAPHOTO/GETTY IMAGES

“Phone users can risk exposure to viruses, malware and other online threats in many ways. Always use trusted app providers from trusted sources such as the App Store or Google Play. Jailbreaking your phone is one of the biggest risks to malware and other potentially dangerous viruses.” — Braden Perry, a litigation, regulatory, and government investigations lawyer.

Plus, these are the iPhone privacy settings you should check right now.

They use a VPN

They use a VPN
FERRANTRAITE/GETTY IMAGES

“VPN to the rescue! A VPN (Virtual Private Network) encrypts your Internet connection to secure it and protect your privacy. You can select the no-sharing option to further protect info from nefarious hackers. There are heaps of VPNs to choose from. Personally, I use NORD VPN – no affiliation. It’s a good value and has excellent features.” — Ethan Taub, CEO of Goalry and Loanry.

Here are 8 apps security experts would never have on their phone.

They don’t use debit cards for online purchases

They don’t use debit cards for online purchases
PEOPLEIMAGES/GETTY IMAGES

“If you’re the victim of fraud, a debit card offers scant protection. Credit cards protect you far more comprehensively and provide you with an extra layer of security. So use a credit card as a precautionary measure. This way, if you are victimised, your recovery will be faster.” — Eaton-Cardone

They use two-step verification

They use two-step verification
DEM10/GETTY IMAGES

“Use Multi-Factor Authentication (MFA) – aka two-factor (2FA), aka two-step verification – whenever and wherever possible. Both Microsoft and Google have recently stated that MFA will stop 99 per cent of all automated attacks.” — Dave Hatter, a software engineer and cybersecurity consultant.

These are the passwords that hackers will guess first.

They protect their credit card info

They protect their credit card info
VADIM ZHAKUPOV/GETTY IMAGES

“Don’t save credit card information on sites where you purchase something. And open a separate credit card specifically for online transactions.” — Hatter.

Here are the clear signs that someone is stealing your Wi-Fi.

They lock out lost devices

They lock out lost devices
FARKNOT_ARCHITECT/GETTY IMAGES

“If a mobile device is lost – laptop, USB drive, smartphone, etc. – and it has company data on it, report to your IT department immediately so user accounts can be disabled and/or monitored for suspicious activity and devices can be locked out of the network.” — Michael Bisso, Director of IT at Edelstein & Co.

They protect their passwords

They protect their passwords
KATLEHO SEISA/GETTY IMAGES

“Protect passwords and change default passwords when applicable. Use password-protected Excel documents to track usernames and passwords. The current version of Excel has strong encryption that’s almost impossible to break. Make sure access to the file is protected by a strong password.” — Peter Purcell, co-founder of EVAN360 and a cybersecurity expert.

This is how to delete yourself from google searches.

They use password managers

They use password managers
VERTIGO3D/GETTY IMAGES

“A password manager is the most amazing thing in our password-cursed world. We have passwords for everything. Most folks fall back to using the same password everywhere. This makes hackers’ lives very easy. They can compromise a website account set over here, and use those credentials at multiple other sites. It’s like carrying the key to a locked door. Password managers will help manage your passwords. They will create complex passwords, they will enter them at the various websites for you, and they will securely store them between use. Win, win, win! You have no excuse not to be using one.” — Nathan Maxwell, a cybersecurity expert at CCI.

Never miss a deal again - sign up now!

Connect with us: