Search

Online security and Internet safety

Updated: Mar 13


Online security and Internet safety are often neglected on computers and on mobile devices, by companies and private individuals, even though state of the art solutions are available.


We live in a time where technology is enabling us to use our mobile devices in ways that use to be only possible on computers. Due to the convenience of today’s technology, more and more of our personal and confidential information, like banking information, passwords etc. can now be accessed from all our devices. The downside of this, is that this could now leave us more vulnerable to theft of information and things like identity theft. Because this is not something that we often think about, victims often only realize that they should have done more to protect this information, once it is too late. For this reason, one need to take action in advance.


Definitions and the risks


Malware is any kind of software designed to annoy or harm the user.


Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. An attack can have devastating results.


Spyware, as the name implies, this is software that is used to spy on devices. Spyware can capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information. This software can then transmit this data to another person's computer over the Internet, without the owner of the device being aware of it.


A Keylogger is a program that records the keystrokes on devices. Keylogger programs are a form of spyware because they usually run without the user knowing it. They can be maliciously installed by hackers to spy on what a user is typing.


Computer Virus is malicious software program loaded onto a user's device without the user's knowledge and performs malicious actions. It can self-replicate, inserting itself onto other programs or files, infecting them in the process.


Computer Worm is a type of malicious software program whose primary function is to infect other computers while remaining active on infected systems. A computer worm is self-replicating malware that duplicates itself to spread to uninfected computers.


A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.


Ransomware is a form of malware in which rogue software code effectively holds a user's computer hostage until a fee is paid. Most ransomware attacks are the result of clicking on an infected email attachment or visiting hacked or malicious websites.


Hackers are skilled programmers using their coding knowledge for bad deeds are better known as hackers.


Protect your computers, tablets and smartphones


Ensure that you have a good Antivirus program that scans and helps remove malware files that enter a computer, tablet or smartphone. Norton AntiVirus, by Symantec is an Ideal product. They have been developing anti-virus software since 1991. Norton AntiVirus offers multi-layer protection. Their technology uses machine learning to determine if a file is good or bad and can do so even if it’s the first time seeing that file.

As you saw from the definitions, today’s online threats include much more than viruses. There are many different kinds of online threats that can infect your devices and give cyber criminals access to your personal data. You want protection against all of them.

Antivirus scans and helps remove malware files that enter a computer, tablet or smartphone. Norton Anti Virus technology uses machine learning to determine if a file is good or bad, and can do so even if it’s the first time seeing that file.

Norton protection also uses “emulation” (running each file in a lightweight virtual machine) to cause online threats to reveal themselves. This happens in milliseconds as you double-click on files. File signature data is now stored in the cloud, and Norton protection has undergone hundreds of optimizations on the antivirus engine to minimize impacting the user experience.


Click to go to : Norton 360 website


Norton for Small Business


With Norton Small Business, a single solution will protect your in-office computers and your on-the-go laptops, tablets and smartphones. Norton security is custom-built for each device, so your PCs and Macs are protected from online threats and identity theft, while your smartphones and tablets are protected from loss and unwanted access to customer information.

Your Protection plan can be customized to suit your needs. Protect a single desktop for one employee, or a laptop, tablet and smartphone for another. Customize your protection with the combination of employees and devices that makes sense for your business.


Get security that grows with your business.


There’s no need to invest in an expensive security solution. With Norton Small Business, you can add protection on a prorated basis only when you need it. That means you won’t pay for protection you can’t use — leaving more money to invest in growing your business instead.


Click to go to : Norton For Small Business website



VPN – Virtual Private network


When you use public WiFi connection you are putting your sensitive data at risk. Exploiting public WiFi networks to gather data is simple and incredibly cheap. Criminals can take advantage of open and un-encrypted networks to steal important data like your bank details, credit cards, photos, and other personal information. Hackers are increasingly targeting hotels, restaurants and public places in pursuit of targets. Unfortunately, most users remain oblivious to the true dangers of open WiFi networks. A reliable VPN is an invaluable privacy tool.


Your IP address also links you to your physical location. It can be used to block users in specific countries from accessing certain websites. Certain services like Netflix their libraries depending on the country that you are in. Using a VPN is the only reliable way to bypass these geographical restrictions and unlock the ‘hidden’ content.

The solution is to make use of a Virtual Private network, more commonly known as VPN.

Two excellent VPN service providers are NordVPN and Norton VPN


Click to go to : NordVPN’s website

Click to go to : Norton VPN’s website


Norton Family Premier


This was developed by Norton, especially to assist parents to protect their children online.

  • Help your kids explore, learn and enjoy their connected world safely

  • Benefits for You and Your Family

  • Helps your kids balance time spent online

  • Makes the Web safer for your kids to explore

  • Teaches habits that help protect kids from oversharing

  • Know at a glance when and where your kids spend time online.

  • Use simple settings to make the Web safe for kids to explore.

  • Easily protect kids’ private information and online reputations.

  • Gain valuable insights that lead to open, informed conversations.

  • Help teach balance and healthy habits without taking away kids’ freedom.

  • Easily protect all your kids’ devices with a single solution.


Click to go to : Norton Family Premier website


Norton ultimate Help Desk


It’s like having your own IT department at home.


Benefits for You:


Get one year of unlimited support for your most important devices

Puts your everyday tech issues in the hands of experts

Provides help anytime you need it, 24/7, from the comfort of your home

Saves time, money and frustration


Click to go to : Norton’s Ultimate Helpdesk website


©2019 by Cobalt Trading. Proudly created with Wix.com