Education logo

Facing Up to the Internet Security Challenge

These days, there's nothing we can do but submit to technology. We likely have no choice because if we didn't, we'd be left ages behind and it won't be very good for our personal sake.

By SHYAM PHADPublished 2 years ago 4 min read
1
Facing Up to the Internet Security Challenge
Photo by Philipp Katzenberger on Unsplash

These days, there's nothing we can do but submit to technology. We likely have no choice because if we didn't, we'd be left ages behind and it won't be very good for our personal sake. Although we can always stick to the old traditional ways, with this fact by now obvious, we simply know that can no longer keep pace with the level of productivity that the digital world has been achieving. Like it or not, we have to join them to survive them.

People inevitably and sometimes unconsciously rely on technology for a multitude of things from the noblest doctor's passion for saving lives to the youngest Internet user's kicks from playing Farmtown on Facebook. In between, there are the essential day-to-day tasks such as banking, Social Security and drivers licenses that require a user to visit a website for account and other sensitive information. Sites that are considered safe are ones that are linked to banks, credit card companies and other organizations that are considered reliable. Users basically rely on these sites for all their information so are more likely to visit them more often.

Unfortunately, safe sites aren't always very easy to spot. On the Internet, anything can happen so it's important to know what you're dealing with before you click on a link and make sure it's not a hoax. A good example is an e-mail that claims to be from the IRS and asks you to verify your tax status. The e-mail even includes a link that leads you to a Web site that looks exactly like the real one. Of course, this is bogus, but still peopleContinue to suffer identity theft.

If you get an e-mail that you think is a fake, be it from the IRS, a credit card company, or any other entity be sure it's one of the old e-mail scams that involve an e-mail supposedly from someone with authority. In other words, don't click on any links that come inside emails. Instead open up a new browser window and type in the organization's address manually. When in doubt, call that company directly and ask if they've received any such email and, if so, why they think you have to click on that link.

PayPal is a wonderful online payment method, but it can be a scary site at times. Make sure you've got a great browser-including Firefox, Internet Explorer, Safari, and Opera-that has built in phishing protection.

Most e-mail is actually a virus with a link in an e-mail. The link leads to one of the many Web sites that disguise themselves as the actual Web site. Many of these Web sites have familiar names that we recognize from TV, Public Service TV, or radio. You may have seen them numerous times, but you may not have recognized the Web site's true identity. Once you reach the Web site, it begins to look very suspicious. Many users have reported that once they begin to enter in their username and password, the Web site begins to capture their keystrokes and sends them back to the person who's web site they've submitted themselves to. Some people have even reported that they've been sent to fake websites that lure them into compromising their sensitive information.

It is important to be aware of the above-mentioned threats in order to avoid becoming a victim. If you feel that an e-mail is genuine and has been sent by your bank or other institution, contact them by phone to confirm you're on the right track. Also, perform a WHOIS lookup on the Web sites you have visited to verify that the company is listed. Companies will very quickly trace the source of the e-mail, which is exactly what you want them to do, since it keeps them from blaming you for spreading malicious software. When all else fails, contact the company via phone and ask them about the e-mail you've received.

If you haven't given out any of your sensitive information in non-threatening terms and you really think it's from them, then give them a call to confirm what they've received. But do not confront them about it, since this is likely to set them off on their way to wherever they thought the malicious software originated.

how to
1

About the Creator

SHYAM PHAD

I am Shyam Phad. I am the founder of The Financial Diary , and I love to write about business and finance.

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments

There are no comments for this story

Be the first to respond and start the conversation.

Sign in to comment

    Find us on social media

    Miscellaneous links

    • Explore
    • Contact
    • Privacy Policy
    • Terms of Use
    • Support

    © 2024 Creatd, Inc. All Rights Reserved.