00:07
Sometimes all it takes is a click and
everything turns black.
00:11
But don't worry - your PC is fine, but you
are now right in the middle of the problem.
00:17
When we talk about security measures, we're
talking about being proactive.
00:22
That is, we take action before something
happens.
00:25
We may drastically lower our vulnerability
to some types of assaults by taking this
strategy. You're probably aware of the
scenario.
00:36
You're sitting in front of your computer,
and it asks whether you want to install the
newest update and restart it.
00:42
And in most circumstances, this is what
occurs to me.
00:45
Yes, I believe I will do so tomorrow.
00:48
The next day, I tell myself, "Yes, I'll do
that the day after tomorrow," and then I
don't. And this is the issue: we are out of
date.
00:56
Every update attempts to close the most
recent security gaps, and this applies to
both the Internet browser and the operating
system, as well as any other type of
software. And, as with all other apps, we
always keep everything up to date to defend
ourselves from threats.
01:14
Is your anti-virus software current?
Do you even have anti-virus software
installed?
Do you have a firewall in place?
How about anti-spyware to prevent others
from accessing your passwords?
Please consider tablets and cell phones as
well.
01:33
Many people around the world use the
password "123456." I sincerely hope this is
not the case for you. I also hope you're not
using your birth date or your spouse's or
husband's first name.
01:47
When it comes to creating a truly secure
password, we should follow the rule of "the
longer the better." And we're talking about
20 characters for extremely critical
passwords - 20 characters containing upper
and lower case, digits, and special
characters. All of these should be included
in your password.
02:09
Furthermore, we should use separate
passwords for each account.
02:16
If you hack one, you hack all of them, which
is not what we want.
02:19
Furthermore, there should be no personal
connection to us, and you are free to change
the passwords at any moment.
02:26
Now I'll give you a few more tips on how to
construct your own secure passwords.
02:31
You can get password cards online, which are
similar to templates in that you know how to
choose the password for a certain account.
02:41
Or you may be extremely inventive: I did
this here; this is my Facebook password.
02:46
You can't access my messages because I
definitely changed it yesterday.
02:50
It appears to be complicated, but it isn't.
02:56
I am always home by 6 p.m.; I love you.
03:02
I remember it since it is related to my
daily activity, which makes this password
reasonably simple to remember.
03:11
If you have the opportunity to implement
two-factor authentication, please do it while
on vacation. You open your email program,
and then you receive an SMS code.
03:24
You validate this code and present it to
your provider.
03:28
Hello, this is me; I have access to this
account.
03:33
One word about email: When perusing your
email inbox, be cautious.
03:40
Why? Email is being used as a tool by an
increasing number of attackers.
03:45
I provided a real example for you;
obviously, the names have been adjusted
slightly. Jane Doe's secretary is Richard
Roe.
03:53
Jane Doe owns a real estate firm.
03:56
Richard receives a short email in the
afternoon that says, "Hello Richard, please
pay the attached invoice." Richard, as
usual, wants to download the PDF and pay the
payment, until he realizes, The time is 2:30
p.m.
04:12
However, his supervisor usually merely
writes "Hello Richard" in the first email he
receives in the morning. Following that, he
usually only gets her orders without greeting
her. He becomes skeptical and double-checks
the email address.
04:26
"jane.doe@doeporperties.com" is written on
it.
04:29
Everything appears to be in order until he
finds spelling errors: properties is spelled
incorrectly. This email domain was used by
someone.
04:41
They acquired a new one that appears
similar, and the money would have been gone
if he had moved the amount.
04:50
The same is true for all other communication
routes.
04:54
Whether it's Skype or Slack, attackers will
find a way, so be cautious.
05:03
When you want to download something, such as
a new piece of software or a program, be
cautious. Please only do this on sites you
are very comfortable with and that are
completely secure.
05:17
You should also be cautious when using the
Internet and entering sensitive information
such as passwords.
05:23
There is a significant distinction between
HTTP and HTTPS.
05:29
When you submit data or passwords on an HTTP
website, they are transmitted.
05:35
They will be encoded with HTTPS.
05:39
That is a significant difference.
05:42
Maintain vigilance and a keen eye.
05:47
Did you know I can also hack you offline?
We're discussing social engineering.
05:54
I need access to your data but don't know
what password you're using.
05:58
Some people, however, utilize a password
recovery question, such as "What was the name
of your first dog?" I can't Google it
because I need information.
06:11
That is difficult, so I spy on you, and lo
and behold, you like to go to the bar on
Wednesday evenings, and voila, the following
Wednesday evening, I also go to the same bar
- I sit down next to you, and at some time,
I begin a conversation about dogs.
06:28
I'll tell you about my current puppy and how
well he's developing - he's just recently
moved in, but we're already quite close.
06:35
And then I'll tell you about my very first
dog, Al Capone.
06:39
"What was the name of your first dog?" I
inquire.
06:42
And you'll say, "Bello, my first dog was
called Bello." I had hacked you at that
point. As a result, as a human, you are the
weakest link in the security chain.
06:56
That was a brief overview of IT security -
those were the fundamentals, the huge
boulders. Aside from those, there are other
measures.
07:05
If you work in a huge corporation, there are
rules, seminars, and training on IT security.
07:12
If you work in a smaller organization, you
may have government contact points with
checklists, protocols, and so on.
07:19
I call is that you invest time and be
vigilant.
07:22
It's very similar to insurance.
07:24
You make payments for several years.
07:26
Nothing ever occurs.
07:28
Finally, you realize, "Gosh, all of that
wasn't necessary." That is, of course,
incorrect reasoning. If something happens,
it will be too late.
07:37
We must take proactive measures.