News

Security myths debunked: Finding fact among fiction

These days, there seems to be an endless amount of information floating around the Internet and other sources pertaining to device infections. Many users are educated as to the best practices for securing their computer and what to look for to detect an infiltration. However, there are still some that put their stock in widely-believed myths about security. To help dispel these false truths, here are some of the top superstitions and fables about device protection, and the true facts behind them:

Myth #1: Antivirus software is in place, so the device can't become infected.
Although antivirus and other monitoring programs are beneficial and can alert the user as to the first signs of malware or other harmful applications, having this safeguard in place does not make the system impervious to infection. Computer Tek Computer Pros noted that this myth is among the most dangerous misgivings today, as this misinformation can lull users into a false sense of protection. In addition, some programs are not aware of all threats in the wild.

"Please understand that in order for antivirus software to protect you from a specific virus, first a lot of computers have to become infected with that virus," the source stated. "how much time goes by between the time that a virus is released into the wild and when your antivirus software actually protects against it could be anywhere from a day to weeks or even months depending on how quickly the infection spreads and how easy it is to detect."

For this reason, users should leverage other means to protect their sensitive information stored on their devices. For example, encryption technology through an SSL certificate could be utilized to make this data indecipherable to unauthorized third-party viewers.

Myth #2: Malware only affects Windows users.
This is a widely-held belief, especially for Mac users. However, SuperAntiSpyware noted that while Windows is a more common target for hackers, OS X and other operating systems can still be affected by malware as well. One of the first recorded viruses was the Elk Cloner, which infected the Apple II nearly 30 years ago. Furthermore, as far as mobile operating systems go, Android is one of the most-attacked OSes out there. As the motivation for most malicious programs is to infiltrate as many users as possible, cybercriminals will develop applications for the majority if widely-utilized operating systems. Therefore, no matter the device or platform on which it operates, users should leverage monitoring programs, encryption and other protections to prevent infection.

Myth #3: If there is no valuable data in the device  it is not a target.
Stanford University noted that many believe that because they do not archive sensitive information internally on their devices, that the system does not present an attractive target for hackers. These individuals' logic here is that because their Social Security number, financial account details or other data is not present on the machine, it will not be infected. Although many times, these users do not take into account their online activities, which are often times a large target for cybercriminals. This includes online banking information, purchases made through e-commerce websites and emails that could contain personal information. 

Protect data in transit with an SSL certificate today. 

corporate office

Thawte
The Gateway
Century Lane
Century City, 7441
Cape Town
South Africa

Postal Address:
P O Box 15986
Panorama 7500
Cape Town
South Africa

Call: +353 1 793 9141
Fax: +27 21 819 2950

Buy now! Try now!