10
A DIGITAL LIFE E-GUIDE A Guide to 2013 New Year’s Resolutions

A Guide to 2013 New Year´s Resolutions · Just as your usual New Year’s resolutions inspire you to become a better person in the coming year, our resolutions and tips will help

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: A Guide to 2013 New Year´s Resolutions · Just as your usual New Year’s resolutions inspire you to become a better person in the coming year, our resolutions and tips will help

A DIGITAL LIFE E-GUIDE

A Guide to 2013 New Year’s Resolutions

Page 2: A Guide to 2013 New Year´s Resolutions · Just as your usual New Year’s resolutions inspire you to become a better person in the coming year, our resolutions and tips will help

2012 is coming to a close, and what better way to prepare for the year ahead than to get our New Year’s resolutions straightened out? With the past lessons from 2012 still fresh in our minds, there is no better time to do so than right now. We’ve put together this guide to help with your resolutions—at least where the security of your digital life is concerned.

Just as your usual New Year’s resolutions inspire you to become a better person in the coming year, our resolutions and tips will help you become a better, more security-conscious netizen.

”I will be more conscious of threats.”

Page 3: A Guide to 2013 New Year´s Resolutions · Just as your usual New Year’s resolutions inspire you to become a better person in the coming year, our resolutions and tips will help

2012 saw new tools and techniques being used in cybercrime. Here are some examples:

• PIXSTEAL – malware that steals and uploads image files to an FTP server.

• PASSTEAL – malware that steals passwords using a password recovery app.

• Blackhole Exploit kit – a toolkit that changed phishing; it steals information without any user interaction or activation

Despite this we believe that there won’t be completely new threats in 2013. Instead we’ll be seeing more of the old malware, only that they may arrive in new and unexpected ways. This is because cybercriminals will focus on making more sophisticated yet subtle techniques in order to victimize as much users as possible.

We will still see more scams in the coming year hooking onto major events like disasters and sensational news. As such, we advise everyone to be more knowledgeable of cybercriminal behavior to prevent being one of their victims.

2013 THREAT TIPS• Keep tabs on the latest

malware-related news and events by subscribing to news websites and feeds related to security.

• Be wary of the files you download and the sites you browse.

• Adopt a healthy skepticism of anything you see online. Always verify before jumping into anything that involves money

• To get an idea of these threats, check out our e-guide How Social Engineering Works.

Page 4: A Guide to 2013 New Year´s Resolutions · Just as your usual New Year’s resolutions inspire you to become a better person in the coming year, our resolutions and tips will help

”I will take better care of my mobile devices.”

Page 5: A Guide to 2013 New Year´s Resolutions · Just as your usual New Year’s resolutions inspire you to become a better person in the coming year, our resolutions and tips will help

2012 also saw the exponential boom in Android malware and high-risk apps—which we foresee to hit 1 million in 2013. What does this mean for the mobile user? This means that users must watch out for more of the same kind of threats to plague their mobiles come the New Year. The only thing that will be different is the way these threats arrive, as cybercriminals will be trying new and surprising delivery methods to catch users off guard.

High-risk apps are something the user should definitely watch out for. These are legitimate apps that are considered malicious because of features that were abused. They blur the line between being malicious and legitimate. Even if you are especially cautious with your device, you might not be able to detect the abuse of high-risk apps until it’s too late.

Treat your mobile device as if it was your laptop or desktop PC—look toward securing and protecting it from threats. After all, mobile devices offer the same kind of service and usage which also makes them vulnerable to infection.

2013 MOBILE CARE TIPS• Download apps with care; if possible,

go to the developer’s website rather than relying on search results.

• Avoid apps that ask for too much information or permissions.

• Avoid ad-supported apps if possible.

• For more information on how to secure your mobile devices, read our e-guide 5 Simple Steps to Secure Your Android-Based Smartphones.

Page 6: A Guide to 2013 New Year´s Resolutions · Just as your usual New Year’s resolutions inspire you to become a better person in the coming year, our resolutions and tips will help

”I will clean up my digital

clutter.”

Page 7: A Guide to 2013 New Year´s Resolutions · Just as your usual New Year’s resolutions inspire you to become a better person in the coming year, our resolutions and tips will help

Today’s cybercriminals are focusing on getting into your online accounts. According to a study we ran , the average Internet user has at least 10 online accounts. Depending on how many devices you own and use, your online accounts might even seem like twice as much! More often than not, your online accounts are also tied to multiple devices. We call this “account fragmentation”, which may lead to compromised accounts. So it’s in your best interest to make sure that they’re all managed properly and secured.

Managing your online accounts may be a nuisance. Hence, we strongly recommend cleaning up your digital clutter. Close accounts that you no longer use, and remove their links from the ones you still use. In 2013, be more organized with your fragmented digital accounts and keep your online and offline world clutter-free.

2013 ANTI-CLUTTER TIPS• Avoid hoarding accounts and

software. Delete, close and/or uninstall unneeded ones.

• Avoid oversharing personal information online. Delete unnecessary content that you may have posted on a whim.

• Try to keep your accounts streamlined; limit your accounts to only the most important ones, and

tie them to a well-protected and secured device.

• For more ideas on how to reduce your digital clutter, read our e-guide Putting an End to Digital Clutter.

Page 9: A Guide to 2013 New Year´s Resolutions · Just as your usual New Year’s resolutions inspire you to become a better person in the coming year, our resolutions and tips will help

A security solution installed on your devices helps threat-proof yourself, your livelihood and your online reputation. Should you accidentally click a malicious link or download a malware-ridden file, your security solution will be your safety net and protect what’s important.

Look into operating systems or platforms that offer increased security than the norm. Windows 8, for example, has been cited to sport several key improvements in security that may help protect users. These improvements, working in tandem with an installed security suite, would help in the long run.

If possible, look into securing Internet-enabled appliances, too. Some of today’s appliances today come with the ability to connect to the Internet. These appliances may come with proprietary operating systems or protocols that could easily be infiltrated by cybercriminals, as the systems may not have been designed with security in mind.

2013 PRO-SECURITY TIPS• Look into security solutions that

update automatically and are worry-free.

• When purchasing devices, ask about the security options available for your potential purchase and maximize their usage.

• Ensure that the people in your

social network are also aware of security risks.

• For a better glimpse of the security landscape, you can check out our latest security roundup Android Under Siege: Popularity Comes at a Price.

Page 10: A Guide to 2013 New Year´s Resolutions · Just as your usual New Year’s resolutions inspire you to become a better person in the coming year, our resolutions and tips will help

©2012 by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.

TRENDLABSSM

TrendLabs is a multinational research, development, and support center with an extensive regional presence committed to 24 x 7 threat surveillance, attack prevention, and timely and seamless solutions delivery. With more than 1,000 threat experts and support engineers deployed round-the-clock in labs located around the globe, TrendLabs enables Trend Micro to continuously monitor the threat landscape across the globe; deliver real-time data to detect, to preempt, and to eliminate threats; research on and analyze technologies to combat new threats; respond in real time to targeted threats; and help customers worldwide minimize damage, reduce costs, and ensure business continuity.

TREND MICRO™

Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years’ experience, we deliver top-ranked client, server and cloud-based security that fits our customers’ and partners’ needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro™ Smart Protection Network™ cloud computing security infrastructure, our products and services stop threats where they emerge—from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.