Fortinet, the global leader in high-performance cyber security solutions, warns businesses and individuals in Philippines to brace for escalating cyber-attacks as cyber-criminals expand their targets to home network devices and mobile devices. Fortinet’s latest Global Threat Landscape Report for Q2 2017 revealed that 90% of organizations recorded attacks targeting system and device vulnerabilities that were at least 3 years old, even though updates and patches that corrected those vulnerabilities had long been available. Even more alarming, about 60% of organizations reported successful attacks that had targeted vulnerabilities that were 10 or more years old. A growing percentage of such attacks also target home network devices, such as routers and wireless access points. And 1 in 20 of such attacks today target mobile devices, such as Android-based smart phones and tablets.

 

Cyber attackers target a wide range of known vulnerabilities in these devices – known collectively as the Internet of Things or IoT – in order to control them remotely, collect users’ data, or install malicious code that allows attackers to aggregate millions of similarly compromised devices into huge cyber weapons known as botnets that can be used to generate huge volumes of data traffic that can overwhelm and shut down targeted online organizations or cripple Internet traffic.

 

“We are now living in a digital world, and cybercrime is part of that new reality,” said Anthony Giandomenico, senior security strategist/researcher, Fortinet. “We have all learned to lock our cars, deadbolt our doors, look both ways before crossing the street, and avoid dark alleyways and streets at night. It is time to develop the same good habits as we navigate through our digital environment.”

 

Fortinet offers the following cyber-safety tips to mitigate the risks of cyber-attacks:

1. Control Your Social Media.

Be careful who you “friend” on your application. Cybercriminals often set up fake pages or accounts and request to be added as a friend. Look out for the following to identify fake requests from criminals hoping to steal data or trick you into clicking on links to infected sites:

 

  • Always look at the home page of the person making the request. When was it set up? What year do they claim to have graduated from college or started their new job? Can you see photos of normal activity or does their page seem to mostly be glamour photos? If you don’t know the person making the request, or anything on their site seems odd, simply dismiss their request.
  • If the person making the request is someone you know, check to see if he or she is already a friend of yours. Look at their vital information. Do the dates seem correct? If you still have doubts, contact them directly to see if they have built a new page. If not, their account has been hijacked or duplicated.

2. Scrutinize Your Online Transactions.

Your bank will never initiate a request to verify your account or provide your login credentials. Such requests, either online or via email, can safely be ignored or deleted. Should one receive an email or a browser page with a link attached, always look at the URL before you click it. Hover over the link and look at the address that shows up. It should start with a real address, such as “www.(yourbank).com”. The address should also be reasonably short. To remove any doubts, simply log into the site directly rather than use the link provided, or call your financial institution to ensure that the request is legitimate.

3. Inspect Your Email.

The most common way to get users to load malicious software or malware onto their systems is through an email attachment. Known as phishing, these attacks often claim that the file attached to your email is a receipt or bill for a fictitious transaction, a fake document that needs immediate attention, or a message from a friend or family member. NEVER click on an attachment or web link in an email from someone you do not know, that you did not request, or that does not seem entirely legitimate.

 

A quick way to check the validity of an email is to simply look at the email address of the sender (you can do that by double clicking on the name of the sender or by hitting reply.) Does the email match the organization? Is it especially long, from a different organization or location from what you expected, or does it include strings of letters or numbers? If so, you can safely delete it.

4. Update Your Devices.

Review devices in your home that are connected to the Internet. These should include phones, DVRs, TVs, security cameras and other online devices, and even home routers and wireless access points. Write down the names of the manufacturers and the model numbers, and list all the software running on these systems. Once you have a complete inventory list, search for known vulnerabilities or patches, and make sure that these devices and applications are running the latest patches and the most current versions of their operating systems, firmware, or software. If a device or application is no longer supported by the manufacturer, the safest thing to do is to replace it.


RECOMMENDED ARTICLE FOR TECHWORLD


 
Tech4ED Named as a Finalist in IDC’s Fifth Annual Smart City Asia Pacific Awards 2019
Techworld Date Posted: 11 May 2019 11:36 AM | 45 Views
IDC Government Insights Asia/Pacific has announced that the Department of Information and Communications Technology’s (DICT) Tech4ED Program has been chosen as one of the finalists in the annual IDC Smart City Asia/Pacific Awards (SCAPA).... See More
 
Tech4ED Named as a Finalist in IDC’s Fifth Annual Smart City Asia Pacific Awards 2019
Techworld Date Posted: 11:36 AM | 45 Views
IDC Government Insights Asia/Pacific has announced that the Department of Information and Communications Technology’s (DICT) Tech4ED Program has been chosen as one of the finalists in the annual IDC Smart City Asia/Pacific Awards (SCAPA)...See More

 
Transcend to Supply High-Quality Memory Products In Spite of DRAM Shortage
Techworld Date Posted: 2 December 2017 4:46 PM | 354 Views
As the global demand for DRAM continue to rise, it is expected the price of DRAM to stay firm through year 2018. See More
 
Transcend to Supply High-Quality Memory Products In Spite of DRAM Shortage
Techworld Date Posted: 4:46 PM | 354 Views
As the global demand for DRAM continue to rise, it is expected the price of DRAM to stay firm through year 2018See More

PC Buyers Guide
Kingston Technology Wins Multiple Awards from Cyber Defense Magazine
Techworld • By: PC Buyers Guide | Date Posted: 20 October 2018 9:13 AM | 56 Views
Kingston, a world leader in memory products and technology solutions, announced that it has won the ‘Hot Company Data Loss Prevention’ category, an acknowledgement of their thought leadership within the industry.. See More
PC Buyers Guide
Kingston Technology Wins Multiple Awards from Cyber Defense Magazine
Techworld • By: PC Buyers Guide | Date Posted: 9:13 AM | 56 Views
Kingston, a world leader in memory products and technology solutions, announced that it has won the ‘Hot Company Data Loss Prevention’ category, an acknowledgement of their thought leadership within the industry.See More

 
Kaspersky Lab Publishes Results of Internal Investigation Related to Incident with Equation APT Source Code
Techworld Date Posted: 17 November 2017 11:24 AM | 430 Views
In early October, a story was published in The Wall Street Journal alleging Kaspersky Lab software was used to download classified data from an NSA employee’s home computer. . See More
 
Kaspersky Lab Publishes Results of Internal Investigation Related to Incident with Equation APT Source Code
Techworld Date Posted: 11:24 AM | 430 Views
In early October, a story was published in The Wall Street Journal alleging Kaspersky Lab software was used to download classified data from an NSA employee’s home computer. See More

 
Fortinet Positioned Furthest for Completeness of Vision in the Challengers Quadrant of Gartner’s First Magic Quadrant for WAN Edge Infrastructure
Techworld Date Posted: 28 November 2018 1:24 PM | 221 Views
Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, has announced their inclusion in Gartner’s first Magic Quadrant for WAN Edge Infrastructure as a Challenger with the furthest placement for.... See More
 
Fortinet Positioned Furthest for Completeness of Vision in the Challengers Quadrant of Gartner’s First Magic Quadrant for WAN Edge Infrastructure
Techworld Date Posted: 1:24 PM | 221 Views
Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, has announced their inclusion in Gartner’s first Magic Quadrant for WAN Edge Infrastructure as a Challenger with the furthest placement for...See More

 
OPPO F9 Elevates Smartphone Standard with Revolutionary VOOC Flash Charge, 6GB RAM, and Gradient Body Design
Techworld Date Posted: 16 August 2018 5:03 PM | 66 Views
Global smartphone innovator OPPO has revealed its latest product in the Philippines—the OPPO F9. Unveiled during the grand launch at Shangri-la at the Fort, the OPPO F9 has made breakthroughs in fast charging, dual.... See More
 
OPPO F9 Elevates Smartphone Standard with Revolutionary VOOC Flash Charge, 6GB RAM, and Gradient Body Design
Techworld Date Posted: 5:03 PM | 66 Views
Global smartphone innovator OPPO has revealed its latest product in the Philippines—the OPPO F9. Unveiled during the grand launch at Shangri-la at the Fort, the OPPO F9 has made breakthroughs in fast charging, dual...See More

 
PLDT Offers Lowest Call Rate to All Networks
Techworld Date Posted: 12 April 2017 2:25 PM | 53 Views
Leading telecoms and digital services provider, PLDT, introduces its lowest call plan offer, the All Net Fam Call 299, starting April. The All Net Fam Call 299 allows subscribers to make 100 minutes of landline.... See More
 
PLDT Offers Lowest Call Rate to All Networks
Techworld Date Posted: 2:25 PM | 53 Views
Leading telecoms and digital services provider, PLDT, introduces its lowest call plan offer, the All Net Fam Call 299, starting April. The All Net Fam Call 299 allows subscribers to make 100 minutes of landline...See More

 
Fortinet Recommended in NSS Labs Next-Generation Intrusion Prevention System (NGIPS) Test
Techworld Date Posted: 16 November 2017 10:31 AM | 596 Views
Fortinet® (NASDAQ: FTNT), the global leader in high-performance cybersecurity solutions, today announced the results of the latest NSS Labs Next-Generation Intrusion Prevention System (NGIPS) group test report.. See More
 
Fortinet Recommended in NSS Labs Next-Generation Intrusion Prevention System (NGIPS) Test
Techworld Date Posted: 10:31 AM | 596 Views
Fortinet® (NASDAQ: FTNT), the global leader in high-performance cybersecurity solutions, today announced the results of the latest NSS Labs Next-Generation Intrusion Prevention System (NGIPS) group test report.See More

Frank Emmanuel Trazo
Adaptability and Stability
Techworld • By: Frank Emmanuel Trazo | Date Posted: 2 August 2017 2:42 PM | 666 Views
California-based multinational computer technology corporation Oracle continues to push on innovating their Security Operation Center (SOC) cloud service, a cloud-native, management, and identity-based platform designed for every company's security systems. Oracle aims to improve.... See More
Frank Emmanuel Trazo
Adaptability and Stability
Techworld • By: Frank Emmanuel Trazo | Date Posted: 2:42 PM | 666 Views
California-based multinational computer technology corporation Oracle continues to push on innovating their Security Operation Center (SOC) cloud service, a cloud-native, management, and identity-based platform designed for every company's security systems. Oracle aims to improve...See More

 
NVIDIA® RTX™ Technology Realises Dream of Real-Time Cinematic Rendering
Techworld Date Posted: 23 March 2018 1:33 PM | 69 Views
NVIDIA® RTX™ is the product of 10 years of work in computer graphics algorithms and GPU architectures. It consists of a highly scalable ray-tracing technology running on NVIDIA® Volta architecture GPUs. Architected to support.... See More
 
NVIDIA® RTX™ Technology Realises Dream of Real-Time Cinematic Rendering
Techworld Date Posted: 1:33 PM | 69 Views
NVIDIA® RTX™ is the product of 10 years of work in computer graphics algorithms and GPU architectures. It consists of a highly scalable ray-tracing technology running on NVIDIA® Volta architecture GPUs. Architected to support...See More


Power by

Download Free AZ | Free Wordpress Themes