{"id":13123,"date":"2011-05-30T21:25:53","date_gmt":"2011-05-30T11:25:53","guid":{"rendered":"http:\/\/power-up.space\/?p=13123"},"modified":"2011-05-30T21:33:36","modified_gmt":"2011-05-30T11:33:36","slug":"connected-and-protected-%e2%80%93-keeping-what%e2%80%99s-yours-yours","status":"publish","type":"post","link":"https:\/\/www.impulsegamer.com\/wordpress\/?p=13123","title":{"rendered":"Connected and Protected \u2013 Keeping what\u2019s yours, yours."},"content":{"rendered":"<p><strong>Connected and Protected \u2013 Keeping what\u2019s yours, yours.<\/strong><\/p>\n<p><strong>By Michele Thompson, Norton online safety advocate ANZ<\/strong><\/p>\n<p>The digital world is now very much engrained in our lives \u2013 in the office, the home &#8211; really anywhere we go. We use the internet for a variety of reasons, shopping and banking, downloading music and movies, gaming or just keeping in touch with friends on social networks.<\/p>\n<p>The way we work, play, shop, and communicate has undergone a transformation unprecedented in its scope and speed. The advancements we\u2019ve seen recently have profoundly changed life for the individual consumer \u2013 and for the enterprises serving them. In a relatively short amount of time, the entire online world is touching our lives in very different ways than we expected just a few short years ago. Today we\u2019re more influenced by connectivity and more dependent on digital content than we ever thought possible!<\/p>\n<p>All this collaboration and shared interaction is truly a great opportunity. However the nature of doing so opens us all up to a variety of potential security risks that we may not be aware of.<\/p>\n<p>In fact, increased connectivity across devices means new ways for cybercriminals to target you online. In the last year, Symantec has seen an increase of 42 percent in mobile vulnerabilities alone. According to the recent Norton Mobile Survey 42 percent of Aussies have fallen victim to mobile phone loss or theft and only 41 percent of Australians are using passwords to protect their mobiles. As we make more financial transactions through mobile devices cybercriminals are likely to develop even more threats targeting smartphones in the future. We need to be protected wherever we are connected and simple things like password protection, is the first line of defence when it comes to protecting ourselves.<\/p>\n<p>As numerous reports have shown recently, there are a growing number of individuals using applications as tools to extort money, spread viruses and generally cause mayhem for the regular internet user. In fact, over the years we have seen the motivation for cybercriminals move away from notoriety to financial gain, as the potential to steal money from internet users increases. Fame vs fortune the motivation has changed. Cybercrime has come a long way from individual hackers with a \u201cLook what I can do\u201d attitude to a multi-million dollar industry that cost more than $550 million in 2009. It\u2019s big money, last year\u2019s Zeus bust police arrested cybercriminals who netted $70 million over an 18-month period with a botnet that instigated malicious code attacks on online banking and trading accounts.<\/p>\n<p>Cybercrime can happen to anyone and it\u2019s already happened to more than 2\/3 of Australians online. Cybercriminals don\u2019t care who you are, where you live or what you do. If you have private information online, such as a credit card, bank account, e-mail address or date of birth, cybercriminals consider you a target. So how much are you worth to a cybercriminal? Believe it or not, credit card data can be bought from as little as $0.07 to as much as $100 per piece on the underground black market.<\/p>\n<p>To put it all in perspective, cybercrime costs Australians $4.5 billion ($US3.9 billion) which is enough to rebuild the Sydney Opera House 10 times over (according to the Norton Cybercrime Report). Breaking this down into what it would cost you &#8211; it would take a victim 29 days to resolve a cybercrime and cost them an average of $608 in out-of-pocket expenses \u2013 in addition to any amount of money that was stolen, added to the inconvenience.<\/p>\n<p>The notion of privacy and security online is changing and it is no longer just about protecting the PC, but it is all about protecting the interactions of internet users. Protecting identities today requires consumers to make smart choices and safeguard their personal information it comes down to education and the right security software.<\/p>\n<p>Cybercrime is a global epidemic that can\u2019t be solved by one company or law enforcement agency alone; keeping the Internet safe is a shared responsibility. Part of that is consumer education on how to stay safe online (with Government initiatives like Law Week and upcoming National Cybersecurity Awareness Week) and part is training law enforcement personnel who are on the front lines of the fight against cybercrime.<\/p>\n<p>To protect and inform the billions of people online, Norton introduced a free tool earlier this year the Norton Cybercrime Index (<a href=\"http:\/\/www.nortoncybercrimeindex.com\/\" target=\"_blank\">www.nortoncybercrimeindex.com<\/a>), a daily update which tracks and warns computer users about daily cybercrime risks around the world, providing information that is timely and actionable.<\/p>\n<p>So how can you increase your awareness of online security and help deny cybercriminals access to your personal information? By following a few common sense tips, you can make the most out of your Internet experience, while protecting you and your family from online threats.<\/p>\n<p>Here are some guidelines for how you can contribute to a safe online experience:<\/p>\n<ul>\n<li><strong>Invest in comprehensive, up-to-date and paid security software <\/strong>that not only offers basic protection, but also helps detect attacks before they happen. It\u2019s no longer sufficient to have anti-virus alone, but two way firewall, password encryption, anti-phishing toolbars and regular updates.<\/li>\n<li>When you are asked to \u201callow\u201d or \u201cdeny\u201d an application access to the Internet, <strong>always deny<\/strong> unless you\u2019re confident the site it is accessing is authentic.<\/li>\n<li><strong>Limit personal posts to people you know and trust<\/strong>. Don\u2019t add people to your trusted list unless you know exactly who they are. Configure privacy settings on your social networking profile to limit the access of personal information to people you know &amp; trust.<\/li>\n<li>What you say online may become public &#8211; even if you post it in a private area. <strong>Don\u2019t disclose personal information<\/strong> about other people either.<\/li>\n<li>Secure your wireless network with a password and don\u2019t allow unknown computers to access your home network.<\/li>\n<li>Always<strong> use strong passwords<\/strong> with a combination of letters and numbers, upper &amp; lower case, special characters and change it regularly.<\/li>\n<li><strong>Look for https:\/\/ at the top of your browser and the padlock symbol<\/strong> on the bottom right-hand corner of the screen.<\/li>\n<\/ul>\n<p><img decoding=\"async\" src=\"http:\/\/www.impulsegamer.com\/news\/winnorton2.jpg\" alt=\"\" \/><\/p>\n<p>To coincide with <em>National Cybersecurity Awareness Week<\/em>, <a href=\"http:\/\/www.impulsegamer.com\/winnorton360version5.html\">click here for a chance to win a COPY OF NORTON 360 VERSION 5<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Connected and Protected \u2013 Keeping what\u2019s yours, yours. By Michele Thompson, Norton online safety advocate ANZ The digital world is now very much engrained in our lives \u2013 in the office, the home &#8211; really anywhere we go. We use the internet for a variety of reasons, shopping and banking, downloading music and movies, gaming<\/p>\n<p class=\"more-link\"><a href=\"https:\/\/www.impulsegamer.com\/wordpress\/?p=13123\">Read More\u2026<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-13123","post","type-post","status-publish","format-standard","hentry","category-game-news"],"_links":{"self":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/13123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13123"}],"version-history":[{"count":4,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/13123\/revisions"}],"predecessor-version":[{"id":13134,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/13123\/revisions\/13134"}],"wp:attachment":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}