List of content you will read in this article:
- 1. Common Security Myths
- 2. Security Myth 1
- 3. Security Myth 2
- 4. Security Myth 3
- 5. Security Myth 4
- 6. Security Myth 5
Common Security Myths
When we’re surfing online, there are many ways to fall under a security breach. Here I will explain the most common security threats that are online, but we take it for granted. So let’s get started with the list.
Security Myth 1
“This cant happen to me, I’m a normal person and there’s nothing worth stealing from me. Only important and rich people get targeted.” Sounds Familiar? This is the number one myth most of the people believe to be true, but it isn’t. Cyber-attacks don’t happen depending on how important you are but by using automated tools to exploit weaker systems. If they get into your system, they will get whatever they can find and they will use it for other malicious activities. Better stop thinking not a target because if you have a digital identity, then you have value.
Security Myth 2
“I have an extremely complicated password, I’m safe from the cyber thieves.” Yes, this is absolutely true. But this is just one layer of securing yourself online and this alone will not keep the cybercriminals away from you. First off, the same password should not be used for other online accounts. If one goes then others will soon follow. The next security breach will happen when we try to store these long passwords, because there’s no way we’re going to remember these passwords. Use a password Management software to keep track of all your passwords of all the online accounts.
Security Myth 3
“If I install this anti-virus software, then I’m safe.” If you believe that one magical software can give you ultimate system security, sadly you are mistaken. This is just a marketing strategy for you to buy their product but in reality, no security solution is impenetrable. Having a security software is definitely a good line of defense but you shouldn’t put your ultimate trust only on the software. You should always be up to date with your systems security and always adding more layers of security rather than relying only on one single software.
Security Myth 4
“I only access and download information from trusted sources.” Unfortunately, this is also a myth. Most people think that simple common sense is enough to stay away from malware, phishing, identity theft and so on. Staying away from spam emails, shady websites or unwanted ads are the common things to avoid being a target but that alone will not keep you completely safe. Cybercriminal can inject malicious codes into legitimate websites, and they might not be visible. Just because it can’t be noticed doesn’t mean they’re not there.
Security Myth 5
“Social networks are safe; I only have the people I know, and they won’t do anything.” Since social media has become very common, there are a lot of threats lurking within. Online criminals are able to place malicious content on social media accounts. The most danger that prevails is the identity theft where the cyber criminals make fake profiles in order to collect personal information from others.
In conclusion, the main problem of these myths make you drop your guard. Hackers know that internet users show ‘safe’ behavior, so they tend to disguise themselves as legitimate as possible. Always be prepared, don’t fall prey to false information and keep yourself up to date with the new security measures that you can use.
I'm fascinated by the IT world and how the 1's and 0's work. While I venture into the world of Technology, I try to share what I know in the simplest way with you. Not a fan of coffee, a travel addict, and a self-accredited 'master chef'.