Tag Archives: Privacy

It’s Cyberattack Season: Did You Get Your Immunization Shot?

There’s a term in public health known as “herd immunity.” The idea is that when a critical number of people are immunized against a contagious disease, most members of that community become protected against the disease, whether or not they received an inoculation.

Breaking the chain of a disease’s transmission enables us to interrupt the ability of the pathogen to set in at a broader scale in our community. In this way, vaccinations protect people who have and haven’t been vaccinated.

The same principle applies to our digital lives which are just as connected, if not more connected, to digital threats and “pathogens” that steal our data and identities, disrupt our productivity, and mar our public profiles.  We spend a great deal of time and energy investing in firewalls and the technical parts of our infrastructure to protect data and privacy, but what about our behavioral practices?

Do we take the time to inoculate ourselves against habits that could risk the digital wellbeing of our family and friends? Or do we, for example, still ask family members for Social Security numbers via email? Or send credit card information and/or passwords insecurely?

“The important principle here is that there are things I can do to help ensure a safer online world for you, and vice versa.”.

If, for example, you posted a compromising photo on social media, I can opt to not re-post it, protecting you from further harm. And if everyone who comes across the photo does the same, we’ve inoculated you from damage even though you had failed to protect yourself.

This is the mindset that we need to adopt in being good digital citizens and embodying the characteristics of a “smart user.” By doing so, we can create an entire network and community of safety and protection.

Most of us, especially the youth and others around the world who are coming online for the first time, are particularly vulnerable. We were all the same at some time. When I worked at Netscape, for example, and got my first email message from a friend “stranded in Thailand,” asking for money – I almost fell for it! On the exposure curve, I was just like a lot of new users today.

Let’s take a page from the herd immunity playbook and create a safer and more private digital world for all of the new users coming online, in addition to helping these users become more educated in smart online behaviors.

AVG has committed to a smart user digital citizenship initiative to build a better web. Please join us or see how you can support this initiative. Because after all, the more you do to help make the web a safer place, you do so not only for yourself but for the whole herd.

To learn more, please visit smartuser.com.

Facebook increases security for users

Don’t ignore Facebook  alerts and take your time to improve your security

Don’t ignore Facebook alerts and take your time to improve your security

Facebook has become more concerned about its users’ security. The social giant understands that education is the key to providing users with a secure experience. We have already seen the Facebook “dinosaur” guiding us via privacy settings. Now Facebook pops out a short guide to improve the security of our profiles. We strongly recommend not to ignore it and take those steps to ensure that your profile is properly protected.

Step 1. Take control over your login

Don’t ignore Facebook  alerts and take your time to improve your security

Don’t ignore Facebook alerts and take your time to improve your security

We check our Facebook profile on multiple devices: Our smartphones, tablets and via different apps (Facebook group, messenger, Facebook app). Sometimes we don’t even realize it! ‘Log Out of Unused Apps’ will show you all the apps that you use to log in, but haven’t used for a long period of time. From a security perspective that can create a vulnerable situation. If you don’t use the app, better log out!

We have also a solution for that. If you don’t want to be bother with constant login into your social account, we recommend Avast Passwords available for all your mobile devices for FREE. Check it out for Android and iOS. With one password you can safely log in into your all social apps, without remembering multiple passwords!

Step 2. Set up login alerts

Get login alerts

Login alerts will notify you about unauthorized login attempts into your account

Facebook will let you know when there is an attempt to log into your account via a new device or browser. You can set up both – Facebook notifications as well as email alerts. In this way you have better control over who, when, and where someone tries to login into your profile. You will receive a notification and if it is a hacking attempt, you can block it. We recommend to chose both options, in order to increase your chances to discover a hacker, before he cracks your account.

 Step 3: Protect your Password

Follow Facebook rules to protect your password

Follow Facebook rules to protect your password

Follow simple security rules:

  1. 1. Set up unique password to your account (don’t use the same password to all your social profiles).
  2. 2. Don’t share it with anyone else.
  3. 3. Make sure your password is strong: it should contain small and big characters, numbers and special signs. We recommend minimum 16 characters.
  4. 4. Change passwords regularly and always, if any of your accounts or websites that you use is compromised.
  5. 5. Last but not least, use Password management system, to protect all your accounts requiring logins, not only Facebook. For example the free Avast Passwords.
Secure Facebooking!

Secure Facebooking!

 


Follow Avast on FacebookTwitterYouTube, and Google+ where we keep you updated on cybersecurity news every day.

Facebook increases security for users

Don’t ignore Facebook  alerts and take your time to improve your security

Don’t ignore Facebook alerts and take your time to improve your security

Facebook has become more concerned about its users’ security. The social giant understands that education is the key to providing users with a secure experience. We have already seen the Facebook “dinosaur” guiding us via privacy settings. Now Facebook pops out a short guide to improve the security of our profiles. We strongly recommend not to ignore it and take those steps to ensure that your profile is properly protected.

Step 1. Take control over your login

Don’t ignore Facebook  alerts and take your time to improve your security

Don’t ignore Facebook alerts and take your time to improve your security

We check our Facebook profile on multiple devices: Our smartphones, tablets and via different apps (Facebook group, messenger, Facebook app). Sometimes we don’t even realize it! ‘Log Out of Unused Apps’ will show you all the apps that you use to log in, but haven’t used for a long period of time. From a security perspective that can create a vulnerable situation. If you don’t use the app, better log out!

We have also a solution for that. If you don’t want to be bother with constant login into your social account, we recommend Avast Passwords available for all your mobile devices for FREE. Check it out for Android and iOS. With one password you can safely log in into your all social apps, without remembering multiple passwords!

Step 2. Set up login alerts

Get login alerts

Login alerts will notify you about unauthorized login attempts into your account

Facebook will let you know when there is an attempt to log into your account via a new device or browser. You can set up both – Facebook notifications as well as email alerts. In this way you have better control over who, when, and where someone tries to login into your profile. You will receive a notification and if it is a hacking attempt, you can block it. We recommend to chose both options, in order to increase your chances to discover a hacker, before he cracks your account.

 Step 3: Protect your Password

Follow Facebook rules to protect your password

Follow Facebook rules to protect your password

Follow simple security rules:

  1. 1. Set up unique password to your account (don’t use the same password to all your social profiles).
  2. 2. Don’t share it with anyone else.
  3. 3. Make sure your password is strong: it should contain small and big characters, numbers and special signs. We recommend minimum 16 characters.
  4. 4. Change passwords regularly and always, if any of your accounts or websites that you use is compromised.
  5. 5. Last but not least, use Password management system, to protect all your accounts requiring logins, not only Facebook. For example the free Avast Passwords.
Secure Facebooking!

Secure Facebooking!

 


Follow Avast on FacebookTwitterYouTube, and Google+ where we keep you updated on cybersecurity news every day.

Facebook increases security for users

Don’t ignore Facebook  alerts and take your time to improve your security

Don’t ignore Facebook alerts and take your time to improve your security

Facebook has become more concerned about its users’ security. The social giant understands that education is the key to providing users with a secure experience. We have already seen the Facebook “dinosaur” guiding us via privacy settings. Now Facebook pops out a short guide to improve the security of our profiles. We strongly recommend not to ignore it and take those steps to ensure that your profile is properly protected.

Step 1. Take control over your login

Don’t ignore Facebook  alerts and take your time to improve your security

Don’t ignore Facebook alerts and take your time to improve your security

We check our Facebook profile on multiple devices: Our smartphones, tablets and via different apps (Facebook group, messenger, Facebook app). Sometimes we don’t even realize it! ‘Log Out of Unused Apps’ will show you all the apps that you use to log in, but haven’t used for a long period of time. From a security perspective that can create a vulnerable situation. If you don’t use the app, better log out!

We have also a solution for that. If you don’t want to be bother with constant login into your social account, we recommend Avast Passwords available for all your mobile devices for FREE. Check it out for Android and iOS. With one password you can safely log in into your all social apps, without remembering multiple passwords!

Step 2. Set up login alerts

Get login alerts

Login alerts will notify you about unauthorized login attempts into your account

Facebook will let you know when there is an attempt to log into your account via a new device or browser. You can set up both – Facebook notifications as well as email alerts. In this way you have better control over who, when, and where someone tries to login into your profile. You will receive a notification and if it is a hacking attempt, you can block it. We recommend to chose both options, in order to increase your chances to discover a hacker, before he cracks your account.

 Step 3: Protect your Password

Follow Facebook rules to protect your password

Follow Facebook rules to protect your password

Follow simple security rules:

  1. 1. Set up unique password to your account (don’t use the same password to all your social profiles).
  2. 2. Don’t share it with anyone else.
  3. 3. Make sure your password is strong: it should contain small and big characters, numbers and special signs. We recommend minimum 16 characters.
  4. 4. Change passwords regularly and always, if any of your accounts or websites that you use is compromised.
  5. 5. Last but not least, use Password management system, to protect all your accounts requiring logins, not only Facebook. For example the free Avast Passwords.
Secure Facebooking!

Secure Facebooking!

 


Follow Avast on FacebookTwitterYouTube, and Google+ where we keep you updated on cybersecurity news every day.

Web Summit 2015 — security was a hot topic

200 startups gave their pitches at the Web Summit this year in Dublin. Over 2,100 startups participated, the vast majority of which had “poster board” displays and one or two eager founders giving their elevator pitch. That makes the Web Summit a welcome change to other conferences that typically rotate around industry giants.

Two messages seemed to pervade the conference this year: location and security. The “location” bit was the move of the Web Summit from Dublin to Lisbon next year. As you can imagine, this was a bit of a blow to the locals, and they could not stop talking about it.  Hopefully Lisbon imports Guinness and Jameson so that a little bit of Dublin carries over.

“Security” discussions seemed more prevalent than ever before. The recent breaches at TalkTalk and Ashley Madison were discussed over and over again…and the recent UK decision to store web histories for everyone for a year was a hot topic, as was the Safe Harbor European Court of Justice ruling. But, more than that, the need for both security and privacy was raised in almost every context: from publishing your web app to talking to IoT devices. The phrase “the Internet of unpatchable crud” was being thrown around often.  Interestingly, many of these conversations were underway before people learned that I was with AVG, and thus involved with security and privacy issues directly.

Further, a lot of the discussions focused around personal security, not just enterprise security. This is a change from a year ago, or even six months ago. This bodes well for AVG’s move into protecting people as well as devices and data.

AVG has been pushing something called “the law of least data” with IoT groups for a while now. The core idea is that data should be routed as directly as possible between entities. This augments the idea of “storing only required and essential data” that has been a mainstay of good data design for a long time. My canonical example is my thermostat talking to my furnace. While setting up the relationship between the two may require the cloud, the day to day control and feedback between the two should not have to leave my house (i.e., my local area network). Even if encrypted, an eavesdropper could probably tell when someone was at home based on the volume of traffic between the two. This is a simple idea, but an important one. When you extend that thinking to many connected devices, including those dealing with health and security, you can imagine the impacts of not respecting the “law of least data.” However, the business/capitalistic forces at work today mean that every vendor wants to backhaul all data to the cloud under the rubric of “data is the new currency.” This is a dangerous architecture and one that we should all be challenging.

Many people, when asked about their personal data leaking, have a fairly resigned attitude. They say, “it is not a big deal, and I get more personalized offers; I know the tradeoffs I am making.” I like to use a simple example to help people understand that seemingly innocuous data is still valuable and can be used in unexpected ways. If you are a serious cycler, you will probably sign up for a bike ride sharing application.  It is fun; you can compete against others as motivation and track your personal progress online. However, thieves also sign up for these services. Using the simple logic that users who ride the most often and the farthest probably have the most expensive bikes, led the thieves to steal bicycles easily using the location tracking data in the services.  Again, you can extend this idea to all types of data to understand that, by default, we should be keeping our data safe and secure.

So, it was refreshing to see these, and other, security topics being actively discussed at the Web Summit. It bodes well for our industry that this is now top of mind.

 

Web Summit 2015 — security was a hot topic

200 startups gave their pitches at the Web Summit this year in Dublin. Over 2,100 startups participated, the vast majority of which had “poster board” displays and one or two eager founders giving their elevator pitch. That makes the Web Summit a welcome change to other conferences that typically rotate around industry giants.

Two messages seemed to pervade the conference this year: location and security. The “location” bit was the move of the Web Summit from Dublin to Lisbon next year. As you can imagine, this was a bit of a blow to the locals, and they could not stop talking about it.  Hopefully Lisbon imports Guinness and Jameson so that a little bit of Dublin carries over.

“Security” discussions seemed more prevalent than ever before. The recent breaches at TalkTalk and Ashley Madison were discussed over and over again…and the recent UK decision to store web histories for everyone for a year was a hot topic, as was the Safe Harbor European Court of Justice ruling. But, more than that, the need for both security and privacy was raised in almost every context: from publishing your web app to talking to IoT devices. The phrase “the Internet of unpatchable crud” was being thrown around often.  Interestingly, many of these conversations were underway before people learned that I was with AVG, and thus involved with security and privacy issues directly.

Further, a lot of the discussions focused around personal security, not just enterprise security. This is a change from a year ago, or even six months ago. This bodes well for AVG’s move into protecting people as well as devices and data.

AVG has been pushing something called “the law of least data” with IoT groups for a while now. The core idea is that data should be routed as directly as possible between entities. This augments the idea of “storing only required and essential data” that has been a mainstay of good data design for a long time. My canonical example is my thermostat talking to my furnace. While setting up the relationship between the two may require the cloud, the day to day control and feedback between the two should not have to leave my house (i.e., my local area network). Even if encrypted, an eavesdropper could probably tell when someone was at home based on the volume of traffic between the two. This is a simple idea, but an important one. When you extend that thinking to many connected devices, including those dealing with health and security, you can imagine the impacts of not respecting the “law of least data.” However, the business/capitalistic forces at work today mean that every vendor wants to backhaul all data to the cloud under the rubric of “data is the new currency.” This is a dangerous architecture and one that we should all be challenging.

Many people, when asked about their personal data leaking, have a fairly resigned attitude. They say, “it is not a big deal, and I get more personalized offers; I know the tradeoffs I am making.” I like to use a simple example to help people understand that seemingly innocuous data is still valuable and can be used in unexpected ways. If you are a serious cycler, you will probably sign up for a bike ride sharing application.  It is fun; you can compete against others as motivation and track your personal progress online. However, thieves also sign up for these services. Using the simple logic that users who ride the most often and the farthest probably have the most expensive bikes, led the thieves to steal bicycles easily using the location tracking data in the services.  Again, you can extend this idea to all types of data to understand that, by default, we should be keeping our data safe and secure.

So, it was refreshing to see these, and other, security topics being actively discussed at the Web Summit. It bodes well for our industry that this is now top of mind.

 

Web Summit 2015 — security was a hot topic

200 startups gave their pitches at the Web Summit this year in Dublin. Over 2,100 startups participated, the vast majority of which had “poster board” displays and one or two eager founders giving their elevator pitch. That makes the Web Summit a welcome change to other conferences that typically rotate around industry giants.

Two messages seemed to pervade the conference this year: location and security. The “location” bit was the move of the Web Summit from Dublin to Lisbon next year. As you can imagine, this was a bit of a blow to the locals, and they could not stop talking about it.  Hopefully Lisbon imports Guinness and Jameson so that a little bit of Dublin carries over.

“Security” discussions seemed more prevalent than ever before. The recent breaches at TalkTalk and Ashley Madison were discussed over and over again…and the recent UK decision to store web histories for everyone for a year was a hot topic, as was the Safe Harbor European Court of Justice ruling. But, more than that, the need for both security and privacy was raised in almost every context: from publishing your web app to talking to IoT devices. The phrase “the Internet of unpatchable crud” was being thrown around often.  Interestingly, many of these conversations were underway before people learned that I was with AVG, and thus involved with security and privacy issues directly.

Further, a lot of the discussions focused around personal security, not just enterprise security. This is a change from a year ago, or even six months ago. This bodes well for AVG’s move into protecting people as well as devices and data.

AVG has been pushing something called “the law of least data” with IoT groups for a while now. The core idea is that data should be routed as directly as possible between entities. This augments the idea of “storing only required and essential data” that has been a mainstay of good data design for a long time. My canonical example is my thermostat talking to my furnace. While setting up the relationship between the two may require the cloud, the day to day control and feedback between the two should not have to leave my house (i.e., my local area network). Even if encrypted, an eavesdropper could probably tell when someone was at home based on the volume of traffic between the two. This is a simple idea, but an important one. When you extend that thinking to many connected devices, including those dealing with health and security, you can imagine the impacts of not respecting the “law of least data.” However, the business/capitalistic forces at work today mean that every vendor wants to backhaul all data to the cloud under the rubric of “data is the new currency.” This is a dangerous architecture and one that we should all be challenging.

Many people, when asked about their personal data leaking, have a fairly resigned attitude. They say, “it is not a big deal, and I get more personalized offers; I know the tradeoffs I am making.” I like to use a simple example to help people understand that seemingly innocuous data is still valuable and can be used in unexpected ways. If you are a serious cycler, you will probably sign up for a bike ride sharing application.  It is fun; you can compete against others as motivation and track your personal progress online. However, thieves also sign up for these services. Using the simple logic that users who ride the most often and the farthest probably have the most expensive bikes, led the thieves to steal bicycles easily using the location tracking data in the services.  Again, you can extend this idea to all types of data to understand that, by default, we should be keeping our data safe and secure.

So, it was refreshing to see these, and other, security topics being actively discussed at the Web Summit. It bodes well for our industry that this is now top of mind.