EXECUTIVE SUMMARY:

In today’s world of sophisticated cyberattacks, people are quick to forget that cyber security starts with simple steps to protect computing devices. While sophisticated attacks are a persistent threat, as individual users, there are steps we can take to protect ourselves from classic exploitative hacker techniques.

Even though thumb drives or USBs have been replaced by other means of file sharing, rogue USB sticks can still deliver a malicious punch to penetrate your devices. How often have users plugged a USB into their device without really knowing whether or not it’s free from malware?

Similarly, connecting devices to untrusted chargers also puts devices and data at risk. Doctored, fake cables allow hackers to access a user device without needing to hack their way into a system.

When using internet-connected devices, users need to stay vigilant with software downloads, untrusted browser extensions, and attempts to gain user information and data such as fake quizzes. Bogus downloads are an effective method used by hackers to infect computers and networks and hold systems for ransom. Similarly, it’s worth reminding users that nefarious websites asking for sensitive personal data may be under the control of cyber criminals who wish to perpetrate identity theft.

These basic cyber security measures will go far to safeguard users, their personal devices and the networks that are relied upon to run your organization.

To brush up on the classic tips and tricks to steer clear of cyber threats, check out this Wired article.