Articles by ImproveYourSecurity

No Image

Myth #9: Why deactivate unused services? Nobody is using them anyway…

The fact that these services aren’t used is a reason to deactivate them. Such services are like the open doors of a house – even if the owner isn’t going through them, a burglar can…


No Image

Myth #8: Spam is just annoying, not dangerous

In addition to being a nuisance, many times spam websites install malware when people visit the site just for fun or out of curiosity. So yes, it can be dangerous. If you buy something advertised…


No Image

Myth #7: I don’t surf on dangerous websites, therefore I am safe

Reputable websites can still get hacked or infected by drive-by downloads. Be aware that any website can be at risk of infection, therefore putting you at risk if you visit it.   These any many…


No Image

Myth #6: Security Suites are overrated

Even if they are using more resources than a simple antivirus program, Security Suites provide multiple protection layers against malware. The security landscape changes continuously and you have to be fully protected against the most common…


No Image

Myth #5: I have an antivirus, therefore I can’t get infected

Even though antivirus software seriously reduces the chances of infection, there is a continuous race between malware and antivirus software. Adding Cloud based detection, heuristic and generic detection to the classical antivirus improves the chance that…


No Image

Myth #4: Why would anyone hack exactly us/me?

There are many reasons why a company gets hacked : to create visible damage to a public reputation, to get revenge, to gain internal information   Many companies around the world were hacked just to…


No Image

Myth #3: Our employees would never steal data!

Recent studies show that this does, in fact, occur.             And even if an employee isn’t planning to actively steal data, what if a USB stick, smartphone or laptop –…


No Image

Myth #2: Our network is secure, we can’t be hacked!

Any network can be hacked. It is only a matter of how badly someone wants to hack it and how many resources they are willing to invest in order to do so. Remember Linkedin, Adobe,…


No Image

Myth #1: This can never happen to me

Most victims of malware, data loss, hardware failure, identity theft, bank fraud often think, “This can never happen to me.”           Anyone can become a victim and not expect it at…


No Image

Use dedicated accounts for each user

I remember that at the beginning of this year a strange news has made it around the globe: a 7 years child almost bought a British Harrier jet fighter on the online auction site eBay….


By continuing to use the site, you agree to the use of cookies and to its Privacy Policy more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close