Fortinet, the global leader in high-performance cyber security solutions, warns businesses and individuals in Philippines to brace for escalating cyber-attacks as cyber-criminals expand their targets to home network devices and mobile devices. Fortinet’s latest Global Threat Landscape Report for Q2 2017 revealed that 90% of organizations recorded attacks targeting system and device vulnerabilities that were at least 3 years old, even though updates and patches that corrected those vulnerabilities had long been available. Even more alarming, about 60% of organizations reported successful attacks that had targeted vulnerabilities that were 10 or more years old. A growing percentage of such attacks also target home network devices, such as routers and wireless access points. And 1 in 20 of such attacks today target mobile devices, such as Android-based smart phones and tablets.

 

Cyber attackers target a wide range of known vulnerabilities in these devices – known collectively as the Internet of Things or IoT – in order to control them remotely, collect users’ data, or install malicious code that allows attackers to aggregate millions of similarly compromised devices into huge cyber weapons known as botnets that can be used to generate huge volumes of data traffic that can overwhelm and shut down targeted online organizations or cripple Internet traffic.

 

“We are now living in a digital world, and cybercrime is part of that new reality,” said Anthony Giandomenico, senior security strategist/researcher, Fortinet. “We have all learned to lock our cars, deadbolt our doors, look both ways before crossing the street, and avoid dark alleyways and streets at night. It is time to develop the same good habits as we navigate through our digital environment.”

 

Fortinet offers the following cyber-safety tips to mitigate the risks of cyber-attacks:

1. Control Your Social Media.

Be careful who you “friend” on your application. Cybercriminals often set up fake pages or accounts and request to be added as a friend. Look out for the following to identify fake requests from criminals hoping to steal data or trick you into clicking on links to infected sites:

 

  • Always look at the home page of the person making the request. When was it set up? What year do they claim to have graduated from college or started their new job? Can you see photos of normal activity or does their page seem to mostly be glamour photos? If you don’t know the person making the request, or anything on their site seems odd, simply dismiss their request.
  • If the person making the request is someone you know, check to see if he or she is already a friend of yours. Look at their vital information. Do the dates seem correct? If you still have doubts, contact them directly to see if they have built a new page. If not, their account has been hijacked or duplicated.

2. Scrutinize Your Online Transactions.

Your bank will never initiate a request to verify your account or provide your login credentials. Such requests, either online or via email, can safely be ignored or deleted. Should one receive an email or a browser page with a link attached, always look at the URL before you click it. Hover over the link and look at the address that shows up. It should start with a real address, such as “www.(yourbank).com”. The address should also be reasonably short. To remove any doubts, simply log into the site directly rather than use the link provided, or call your financial institution to ensure that the request is legitimate.

3. Inspect Your Email.

The most common way to get users to load malicious software or malware onto their systems is through an email attachment. Known as phishing, these attacks often claim that the file attached to your email is a receipt or bill for a fictitious transaction, a fake document that needs immediate attention, or a message from a friend or family member. NEVER click on an attachment or web link in an email from someone you do not know, that you did not request, or that does not seem entirely legitimate.

 

A quick way to check the validity of an email is to simply look at the email address of the sender (you can do that by double clicking on the name of the sender or by hitting reply.) Does the email match the organization? Is it especially long, from a different organization or location from what you expected, or does it include strings of letters or numbers? If so, you can safely delete it.

4. Update Your Devices.

Review devices in your home that are connected to the Internet. These should include phones, DVRs, TVs, security cameras and other online devices, and even home routers and wireless access points. Write down the names of the manufacturers and the model numbers, and list all the software running on these systems. Once you have a complete inventory list, search for known vulnerabilities or patches, and make sure that these devices and applications are running the latest patches and the most current versions of their operating systems, firmware, or software. If a device or application is no longer supported by the manufacturer, the safest thing to do is to replace it.


RECOMMENDED ARTICLE FOR TECHWORLD


 
Belkin Accessories for New Gen iPhones Are Now Available at Power Mac Center
Techworld Date Posted: 29 June 2018 4:35 PM | 284 Views
  Modern life is unthinkable without the iPhone, especially as it has replaced almost every other device needed at work and in everyday life. Keep yours in peak performance with the help of the.... See More
 
Belkin Accessories for New Gen iPhones Are Now Available at Power Mac Center
Techworld Date Posted: 4:35 PM | 284 Views
  Modern life is unthinkable without the iPhone, especially as it has replaced almost every other device needed at work and in everyday life. Keep yours in peak performance with the help of the...See More

 
HyperX Joins ESGS 2017 with Team Execration
Techworld Date Posted: 25 October 2017 10:38 AM | 326 Views
HyperX, the gaming division of Kingston Technology, today announced their presence at ESGS 2017 and all the fun activities to engage with the vast Filipino Gaming Community at SMX Convention Center from October 27th.... See More
 
HyperX Joins ESGS 2017 with Team Execration
Techworld Date Posted: 10:38 AM | 326 Views
HyperX, the gaming division of Kingston Technology, today announced their presence at ESGS 2017 and all the fun activities to engage with the vast Filipino Gaming Community at SMX Convention Center from October 27th...See More

 
Get the New iPad 6th Gen from Smart Bro at Php999 per Month
Techworld Date Posted: 24 July 2018 11:16 AM | 350 Views
Looking for the perfect learning tool for your child or a fun and entertaining device to share with your kid?   Look no further as Smart Bro makes it a lot easier for you.... See More
 
Get the New iPad 6th Gen from Smart Bro at Php999 per Month
Techworld Date Posted: 11:16 AM | 350 Views
Looking for the perfect learning tool for your child or a fun and entertaining device to share with your kid?   Look no further as Smart Bro makes it a lot easier for you...See More

 
Kaspersky Lab Announces Opening of New APAC Headquarters
Techworld Date Posted: 14 July 2017 2:17 PM | 166 Views
To support the expansion of its business in Asia Pacific, Kaspersky Lab today announces the opening of a new location in Singapore for its regional HQ. There are currently 37 Kaspersky Lab offices in 32.... See More
 
Kaspersky Lab Announces Opening of New APAC Headquarters
Techworld Date Posted: 2:17 PM | 166 Views
To support the expansion of its business in Asia Pacific, Kaspersky Lab today announces the opening of a new location in Singapore for its regional HQ. There are currently 37 Kaspersky Lab offices in 32...See More

 
From Cloud Growth to a Cloud Mess: Two Out of Three SMBs Struggle with Over-Complicated IT Infrastructure
Techworld Date Posted: 5 July 2018 2:01 PM | 277 Views
As their businesses grow, companies increasingly embrace new business tools and cloud services in an attempt to make their employees’ working lives more efficient and flexible, as well as reduce expenditures. . See More
 
From Cloud Growth to a Cloud Mess: Two Out of Three SMBs Struggle with Over-Complicated IT Infrastructure
Techworld Date Posted: 2:01 PM | 277 Views
As their businesses grow, companies increasingly embrace new business tools and cloud services in an attempt to make their employees’ working lives more efficient and flexible, as well as reduce expenditures. See More

 
Lian Li Announces Thanksgiving Build Contest in Partnership with Der8auer, ASUS and ADATA
Techworld Date Posted: 12 November 2018 4:54 PM | 55 Views
Lian Li Industrial Co. Ltd., the world’s leading manufacturer of aluminum chassis for enthusiasts, custom OEM/ODM case solutions, and case accessories is thrilled to invite all owners of Lian Li O11 Dynamic and O11.... See More
 
Lian Li Announces Thanksgiving Build Contest in Partnership with Der8auer, ASUS and ADATA
Techworld Date Posted: 4:54 PM | 55 Views
Lian Li Industrial Co. Ltd., the world’s leading manufacturer of aluminum chassis for enthusiasts, custom OEM/ODM case solutions, and case accessories is thrilled to invite all owners of Lian Li O11 Dynamic and O11...See More

 
HMD Global, Chicago Bulls Power Forward Lauri Markkanen Ink Long-Term Partnership
Techworld Date Posted: 23 January 2018 4:41 PM | 152 Views
HMD Global has signed a long-term co-operation agreement with Finnish NBA player Lauri Markkanen, who is playing his first season in the NBA as power forward for the Chicago Bulls.. See More
 
HMD Global, Chicago Bulls Power Forward Lauri Markkanen Ink Long-Term Partnership
Techworld Date Posted: 4:41 PM | 152 Views
HMD Global has signed a long-term co-operation agreement with Finnish NBA player Lauri Markkanen, who is playing his first season in the NBA as power forward for the Chicago Bulls.See More

Rafael Aquino
Intel® Meltdown And Spectre Updates
Techworld • By: Rafael Aquino | Date Posted: 14 March 2018 1:25 PM | 384 Views
Security vulnerabilities are everywhere, but lately, a new pair is on the loose. Intel® just received massive updates late February 2018 to early March for all processors that are currently in circulation. . See More
Rafael Aquino
Intel® Meltdown And Spectre Updates
Techworld • By: Rafael Aquino | Date Posted: 1:25 PM | 384 Views
Security vulnerabilities are everywhere, but lately, a new pair is on the loose. Intel® just received massive updates late February 2018 to early March for all processors that are currently in circulation. See More

 
IDC Philippines Unveils its Top ICT Predictions for 2017 and Beyond
Techworld Date Posted: 9 February 2017 2:38 PM | 170 Views
MANILA, Philippines – IDC Philippines announced its top predictions for the Philippine ICT industry for 2017 and beyond and predicts 25% of its top 1,000 companies will see majority of their business depend on.... See More
 
IDC Philippines Unveils its Top ICT Predictions for 2017 and Beyond
Techworld Date Posted: 2:38 PM | 170 Views
MANILA, Philippines – IDC Philippines announced its top predictions for the Philippine ICT industry for 2017 and beyond and predicts 25% of its top 1,000 companies will see majority of their business depend on...See More

 
Attacks Leveraging Exploits for Microsoft Office Grew Fourfold in Early 2018
Techworld Date Posted: 28 May 2018 4:13 PM | 177 Views
Exploits, software that takes advantage of a bug or vulnerability, for Microsoft Office in-the-wild hit the list of cyber headaches in Q1 2018. Overall, the number of users attacked with malicious Office documents rose.... See More
 
Attacks Leveraging Exploits for Microsoft Office Grew Fourfold in Early 2018
Techworld Date Posted: 4:13 PM | 177 Views
Exploits, software that takes advantage of a bug or vulnerability, for Microsoft Office in-the-wild hit the list of cyber headaches in Q1 2018. Overall, the number of users attacked with malicious Office documents rose...See More


Power by

Download Free AZ | Free Wordpress Themes