Security Threats On The Internet And How To Protect Yourself And Your Business

Why Online Security Is A Challenge You Can't Safely Ignore

Posted 14 September, 2006

With the increasing use, in our environment, not just of computers but now the internet, it is time to talk about the serious issue of online security. The internet provides huge benefits that have make it a tool of growing dominance in both private life and business operations. It's far-reaching impact continues to extend to all facets of human life, which is why everybody is attracted. It's gratifying to observe that our people are gradually coming to the realisation that there is so much to lose by not engaging the internet constructively and this is manifesting in its greater use in business, education, private communication, etc. Unfortunately, because the world is not exclusively populated by good people, a lot of unhealthy activities are also widely run on the internet. Even businesses that are seeking unfair advantage or merely engaging unfair means to pursue their objectives, participate in acts that breach other users' privacy, security and even commercial interests. So, you can be an unsuspecting target of cybercrime. The consequences can also be more serious than you would readily imagine, as shown by experiences of several past victims, especially in environments where active use has evolved.

Who Is At Risk?
A good question and the erroneous temptation is to think that it's only big business that should worry about cyber-security. But every user is at risk, including small businesses and individuals. In fact for the latter groups, the threat is potentially more dangerous because of the surprise element they face - they often fail to anticipate any danger. Big business is different, as most of them have in-house IT professionals or engage the services of specialists, and consequently get best-practice advice on protection to implement. Well, if you ever use a computer online, there is a risk and here are some basics to get you thinking security.

Major Risk Activities And Lapses
There is a lot of creativity and technical savvy going into what cyber-criminals do, which is why it is difficult to pin what could hit you. However, the following activities are major risk areas to watch:

1. Email.
Still one of the most versatile and beneficial uses of the internet, but also a vehicle for possible attacks.

  • Attachment you receive with a mail has a risk of virus infection, especially if from an unfamiliar source.


  • Spam mails are, firstly, an unwarranted invasion of your privacy and have a lot of nuisance effect. They could also cost you a lot in valuable productive time, if you get distracted by them. Thirdly, they can be used to access your system with spyware or virus attacks.


  • Emails that ask your confirmation of certain information regarding your personal details, usually designed to appear as coming from a reputable organisation or from some charity organisation asking your support, are often aiming at capturing your personal information, especially your credit/debit card details. Identity theft is rampart and could cost you dearly.


  • Links in mails you receive, directing you to some sites for certain benefit or other information, may just be leading you to a 'poisoned' site.

2. Browsing.
We all do it, navigating across sites, clicking, opening, downloading, etc. While a lot of sites on the internet are safe, there are still malicious sites, which can hurt you if you stray into them. As you probably know, your browser and operating system, like other software, are not perfect. Holes are discovered all the time by hackers and these are used in launching attacks, which is why updates continue to come up. If your browse indiscriminately and without caution, you could land at a site that could prove harmful.

3. Online Purchases
Shopping online has become a common experience in developed economies and is gradually seeping into our system. The typical online purchase requires giving out your payment information. If this is not through a secure gateway (with effective encrypting), such sensitive info could be accessed and used against your interest.

4. Freeware And Other Downloads
A lot of free stuff is available on the internet - free software (sometimes a basic version aimed at upselling), ebooks, whitepapers and all. Some are genuine free gifts, perhaps for driving marketing. Some infest your system, at best, with negligible risk or low threat adware (spying your browsing or other habits from within your PC). Others are more malicious spyware wiith capacity for serious damage (like copying the manuscript of your unpublished book to another party or transmitting a guarded product formula to your competitor).

5. Password Use
Passwords are a major part of using computers and the internet - they are designed to protect and so give a sense of security. When, however, you fail to use it properly, you expose yourself and your vital resources. Password concerns range from how you create a rock-solid (not possible to derive) password, how you keep it (write for people to see?), frequency of change, care over inputting, etc. Password management weaknesses can be the root of a severe security threat to your business or personal data or financial resources.

6. Pop-Ups
Pop-ups not only interfere with your work and distract your attention, they could also offer baits that can lead you into compromising your security. Those offers of unsolicited mouth-watering jackpots and gifts, giving you time limit to claim your booty, may only trick you into giving out information that may harm you or get attacked in some other way.

Why You Shouldn't Despair
These activities are not exhaustive of what could expose you to risk on the internet. However, this is not meant to scare you off the internet. It's only to alert you to the risks that exist, as in other endeavours of life, because, as earlier stated, the world today is not a perfect place - the good and the bad co-exist. There is so much to gain from the internet. Your responsibility is to organise your online activities in a manner that ensures your protection. The good news is that technology also continues to provide tools that complement your common-sense approach, to help you succeed in beating the odds. There are reasonably protective measures you can take to enhance your safety on the internet. That is why we provide you two best-practice documents on protective measures to ensure your online safety, for free download.


Copyright © 2006. Acceler8now.com. All rights reserved.

If you would like to receive coaching for launching and growing your online business or advisory support for building your offline small business, Acceler8now.com will provide the hand-holding to ensure your success. Contact us now for more information or visit www.acceler8now.com for online resources.



Get these smart tools to drive your work and business

Top quality laptops.

Work on the go. Make your presentations anywhere, any time. Use a laptop with the power to deliver. Read more»

LaptopBuy now

Pure Sine Wave Inverters

Work without power disruptions. Save big on diesel, oil and gen repairs which you won't need. No noise, no pollution. Read more»

InverterBuy now

Digital Blood Pressure Monitors

Keep a tab on your blood pressure. Beat unidentified and unchecked High BP, a major killer. Take accurate, reliable readings anywhere, any time. Read more»

BP monitorBuy now

Top Business Books

Get cutting edge ideas to drive your performance. Read best-rated business and investment books to hone your skills. Marketing. Strategy. Branding, Leadership. And more. Read more»

Biz book Buy now