Dynadot

security How to Protect Your Domains and Other Sensitive Data, Part III

NameSilo
Watch

News

Hand-picked NewsTop Member
Impact
3,508
"This is final segment of a three part series addressing security measures and precautions you can take to protect your domains and other data. Check out parts 1 and 2."
From Wi-Fi “honeypots” to social engineering heists, we’ve covered the most common types of attacks on your domains and data. This final segment will expose the more sophisticated schemes criminals use to steal your digital assets: malicious applications that run in the background. Note that even if you are a Mac user, your computer is still open to malware! Some of the most common signs of an “infection” are random pop-ups, a sluggish computer, constant crashing, large network activity, and altered browser settings. The most talented virtual thieves will design programs that don’t have any “tells” so they can quietly run in the background for the life of your device and collect your information without detection. Most of these criminals utilize classic “bait-and-switch” tactics–posing their applications as a game, tool, or media file waiting to be downloaded.
1. Common Delivery Methods – The most common avenues for malevolent application downloads are malicious sites, new or unrated games or tools in the app store, and emails.
2. Bait and Switch Apps – It’s not often that people look at mobile apps and think “danger.” Light widgets, fun games, and other tools can get the best of users.
3. Bitcoin Ransom – This tactic is known as cryptolocker ransomware. After your computer is infected, it encrypts areas of your hard drive, then presents the option of paying for a key to the encryption using bitcoins.
4. Keyloggers – These programs record your computer’s and device’s keystrokes and will eventually divulge your passwords.
5. Donated or Sold Devices – After donating or selling your device to a 3rd party, criminals will often run programs that unearth sensitive information even after it’s been deleted several times.
Using these safeguards is a great start to protect your domains and other digital assets. Remember that these suggestions are intended to help and not hinder your performance. Prioritize your long term goals and take the proactive steps that will save you the most time and stress. For example, most banking institutions do not make themselves 100% completely impervious to theft because it is too expensive and time intensive to be worth the effort. This isn’t to say they don’t take any precautions either, and we know they deter a vast majority of attempts. Find a happy medium by thinking long term and having a strategy for a maintainable defensive.
Source
 
0
•••
The views expressed on this page by users and staff are their own, not those of NamePros.
  • The sidebar remains visible by scrolling at a speed relative to the page’s height.
Back