By Lance Hickerson, Reference Department
He covers “99 Things” in the form of questions, like, for instance question # 18: “How would Cybercriminals Go After Me?” His answer includes the following:
- If the wireless Internet connection in your home or office is not secure, you’re vulnerable.
- If the operating system on your computer is not up to date, you’re vulnerable.
- If the browser on your computer is outdated, you’re vulnerable.
- If, while on your own computer, you visit risky websites or online gaming sites that are hosted in foreign countries, you’re vulnerable.
- If you download pirated software, movies, or music, you’re vulnerable.
- If you engage in illicit activities on the Internet, you’re vulnerable.
- Even if all of your security software is updated, if you enter credit card information into a website that is not properly secured, you’re vulnerable.
- If you enter your Social Security Number into a website that is not properly secured, you’re vulnerable.
- If you provide you data to a company that believes they are fully secure, but whose employees might open phishing email that can compromise their entire network, you’re vulnerable” (pp. 30-31).
Throughout the book, the author relates a wealth of data, like the following regarding simple passwords: “When 32 million passwords were exposed in a breach last year, almost 1 percent of victims were using 123456. The next most popular password was 12345. Other common choices are 111111, princess, qwerty, and abc123. Avoid these types of passwords, which are easily guessed” (p. 166).
- Install spyware protection.
- Create a junk mail account.
- Use special screen and email names.
- Do not fill out all the fields when registering online.
- Read and monitor privacy policies.
- Ask friends and family to be cautious about posting your private information.
- Choose unusual answers for your security questions.
- Don’t open emails or click on links from strangers.
- Use only a secure, designated PC for online banking.
- If you think you have a cyberstalker, move fast. (pp. 161 – 165).
Author Robert Siciliano above points out two important numbers: the average time victims spend repairing their lives from new fraudulent accounts is 165 hours, while the average time victims spent repairing their existing accounts is 58 hours (p. 9). Just a few minutes of prevention following tips from these two books could save hours of cure.