POSSIBLE THREATS AND HOW TO AVOID ATTACKS
COMPUTER VIRUSES
A computer virus is a program written to alter the way a computer operates, without the permission or knowledge of the user.
How to avoid PHISHING
Antivirus solutions with identity theft protection can be "taught" to recognize phishing threats in fractions of a second.
BYOD RISKS stand for
Bring-your-own-device (BYOD)
How to avoid COMPUTER VIRUSES
Carefully evaluating free software, downloads from peer-to-peer file sharing sites, and emails from unknown senders are crucial to avoiding viruses. The single most-effective way of fending off viruses is up-to-date antiviruses software from a reputable provider.
UNSECURED NETWORKS
From cafes to airports, hotels and other areas, plugging tablets into public Wi-Fi hotspots may be convenient for on-the-go employees, but it's also one of the easiest ways to give cyber criminals access to sensitive data.
HACKERS AND PREDATORS
Hackers and predators are programmers who victimize others for their own gain by breaking into computer systems to steal, change, or destroy information as a form of cyber-terrorism.
How to avoid SPYWARE THREATS
If a company you don't recognize is advertising for a deal that seems too good to be true, be sure you have an internet security solution in place and click with caution.
How to avoid/deal with: BYOD
Make sure to implement and enforce an effective BYOD policy. Privacy and how the company can access and monitor employee devices for security purposes. Keep all business data completely separate from the rest of the device.
How to avoid HACKERS AND PREDATORS
Online security tools with identity theft protection are one of the most effective ways to protect yourself from this brand of cybercriminal.
PHISHING
Phishing attacks are some of the most successful methods for cyber criminals looking to pull off a data breach. Masquerading as a trustworthy person or business, phishers attempt to steal sensitive financial or personal information through fraudulent email or instant messages.
SPYWARE THREATS
Spyware is any program that monitors your online activities or installs programs without your consent for profit or to capture personal information.
How to avoid: UNSECURED NETWORKS
The best way to protect employee tablets is by installing a virtual private network (VPN use a carrier-based, paid Wi-Fi hotspot, Instruct employees to ensure that the websites they visit and where they enter private information use Secure Socket Layer (SSL),
How to avoid DATA LOSS
The simplest way to prevent data loss is to back up data frequently and automatically. One way to do so is by using a third-party cloud storage solution, such as Dropbox, Box, Google Drive or OneDrive.
DATA LOSS
This could mean hackers doing anything from stealing data in the background to locking you out of your device or network systems.
IMPORTANTS UNSECURED NETWORKS
Wi-Fi side-jacking — the use of Internet tracking technologies to capture in-transit data, such as email and other login information, via wireless networks.