Sunday, October 19, 2014

Cybersecurity for Electronic Devices

Why Cyber security extend beyond computers?
In fact, the problem is not that cyber security extends beyond computers; is that computers go beyond laptops and traditional desktop computers. Many electronic devices are computers, cell phones and tablets to video games and car navigation systems. While computers have more information characteristics and features, they also introduce new risks. Attackers may be able to take advantage of these technological advances to target devices previously considered "safe." For example, an attacker may be able to infect your cell phone by a virus steal your phone or wireless service or access data from your device. These activities not only affect your personal information, but they could also have serious consequences if you store information on the device.

What types of electronic devices are vulnerable?
Every piece of electronic equipment that uses a kind of computer component is vulnerable to software flaws and vulnerabilities. The risk increases if the device is connected to the Internet or a network that the attacker can access. Remember that the wireless connection also has these risks (see securing wireless networks for more information). The connection to the outside is a way for an attacker to send information to and retrieve information from your device

How can you protect yourself?
Remember physical security - Having physical access to a device making it easier for an attacker to remove or alter the data. Do not leave your device unattended in public areas or easily accessible (see the protection of mobile devices: Physical Security for more information).
Keep software up to date - If the vendor releases updates for the operating software of your device, install it as soon as possible. Their installation will prevent attackers from being able to enjoy any problems or known vulnerabilities (see Understanding Patches for more information).
Use passwords - Choose appliances that allow you to protect your information with passwords. Select passwords will be difficult for thieves to guess, and use different passwords for different programs and devices (see Choosing and protecting Passwords for more information). Do not choose options that allow your computer to remember your passwords.
Disable remote connectivity - Some mobile devices are equipped with wireless technologies such as Bluetooth, which can be used to connect to other devices or computers. You must disable these functions when they are not in use (see Understanding Bluetooth for more information).
Encrypt files - If you store personal or professional information, see if your camera offers the ability to encrypt files. By encrypting files, you ensure that unauthorized people can not view the data, even if they can physically access it. When using encryption, it is important to remember your passwords and pass phrases; if you forget or lose them, you may lose your data.

No comments:

Post a Comment


Anti Spyware Anti Trojan Elite Antivirus Apps for Android Phones Antivirus Apps for Samsung Antivirus Review Antivirus Support Avast AVG Avira Antivirus BestCrypt BitDefender Boot Sector Virus BullGuard Clamwin Classroom Spy Pro Cleanup inbox and manage emails Cloud Backup Cloud Computing Security Comodo Computer Certification Courses Conficker worm Cyber Bullying cyber security Data Protection DoctoAntivirus Downloads DR Drive Genius3 eScan Antivirus Fake Antivirus Fast PC Fat Data Recovery Firewall protecion Folder Guard Professional GFI Languard Hackers HitmanPro IDS IE antivirus Installerex IT Consultants K-Secure VPN K7 Antivirus Kaspersky Linux antivirus Loaris trojan malware Manually Virus Delete mcafee MCAfee SuperDAT Microsoft Security Essential Most Danger PC Viruses Netgate spy emergency NOD32 Norman Malware Norton Online Antivirus Panda Cloud antivirus PC Care PC Doctor Pc Resources PC Technician PC Tools Antivirus PC Virus PDA Antivirus Pop-Up Removal PrivateFirewall Protector Plus Registry Clean Remove Spyware Rootkit Virus Safe Emailing Security Shardana Antivirus Rescue Disk Smartphone security Social Network Safety spyhunter Spyware SuperantiSpyware Symantec The Cleaner 2011 Top Antivirus Top Destructive Viruses Trojan Horse Trojan Killer trust port Twitter Protection USB Security Vipre Internet Security Virus Definitions Virus Scanners VueScan Pro WEB Antivirus Website Security WinASO Registry optimizer windows 7 Windows 8 Protection Windows Vista Virus Windows.8.1 WinMend System Doctor Wireless Network Protection Zemana AntiLogger