Here are the 10 cybersecurity myths you need to stop believing

Aug 24, 2020, 4:05 AM
(Pixabay Photo)...
(Pixabay Photo)
(Pixabay Photo)

On the Dark Web, you can purchase cybercrime “how-to kits” that gather lists of breached names, account numbers, passwords, and even telephone support lines for the victims to call. It’s not difficult to get on the Dark Web.

Make no mistake. Just because you’re on the Dark Web doesn’t mean you’re anonymous.

Ransomware attacks, data breaches, and scams — along with a steady stream of extortion and phishing emails — have taken over the internet. We hear about cybercrime so often that it can quickly turn into white noise. That’s a mistake.

Here are 10 security myths you need to stop believing about your data.

1. I don’t have anything worth protecting

You might think your data isn’t worth anything. You might think because you’re broke, no one cares about your data. You might also think that since you have nothing to hide, there’s no point in protecting your identity or information.

Think about it this way: All those free social media apps you sign up for — Facebook, Twitter, Instagram, Pinterest, Snapchat — aren’t free at all. When you sign the Terms and Conditions, you’re signing away your right to privacy, which lets the apps build a detailed demographic profile of you.

The companies turn around and sell this information to marketers; that means your information is making these companies millions of dollars. So why wouldn’t hackers want to cash in on that?

2. I use security software, so I’m fine

Many people think that security software will act as an invincible shield between their data and hackers. A group of Russian hackers breached servers of three major antivirus providers. Now, all the information they stole is up for sale on the Dark Web

So, what’s an excellent way to work around this danger? Keep your operating system software and security software updated. Do the same for your other devices, including your phone and tablet.

Don’t forget about your router. Once hackers break into that, every device using it to connect to the internet is vulnerable.

Finally, make sure you’re using the right security software.

3. With all these data breaches, I have nothing left to protect

Want to see if your data has already been breached? One website has been tracking data breaches for years and put a handy search tool online. You simply enter your email address and get a yes or no answer.

Let’s say you’re on the list. You may feel hopeless, and like there’s no point in protecting your data since it’s already been overtaken.

That’s not true. There are different types of data breaches that can have different impacts. For example, say your password and username to your bank account have been breached. Don’t give up — inaction empowers the hackers to pry for even more information, which could lead them to your Social Security number.

4. Phishing scams are easy to spot

Phishing scams are becoming more sophisticated as hackers infiltrate companies, CEO’s personal accounts, and even government agencies. Phishing scams have skyrocketed during COVID-19.

Very realistic looking extortion scams are making the rounds. The subject contains your email address and a password that looks familiar. The scammer says unless you pay up, they will release the video of you that they took using your webcam when you visited a porn site.

Don’t buy it. The scammer got your email address and password from a data breach. If you are still using the combination of both, it’s best to change your password at the very least.

It’s not always as simple as an unfamiliar account reaching out to you with bizarre messages trying to get you to click on a link. Sometimes, they use familiar faces against you, which leads to the next myth.

5. My friends on social media won’t hurt me

The great thing about social media is that it connects you with your friends and relatives. Unfortunately, the web of connectivity can be an opening for spiders to turn friends into gateways for data breaches.

Say your friend has a weak password, and their account gets breached. Say they send you a private message saying they found a funny new video or a cool new site you should check out. Since the link is coming from a familiar face, your guard may be down. After all, you’re aware of phishing scams when you get a message from someone you’ve never heard of, but you don’t have that on your mind when you hear from a friend.

Hackers bank on those lowered guards to corrupt your web and turn it into a jumping point for even more data breaches.

6. Hackers are mysterious, scary figures

When you think of a hacker, you probably imagine popular images of hooded figures hunched over a computer. A lot of hackers are regular people and can be hard to spot.

It’s important to realize that hackers aren’t lone wolves. There are entire organizations — some government-funded — that work together to infiltrate data and rake in millions. Hacking is also a popular way for mobsters to bring in cash at long distances.

Once you realize just how dire this threat is, it becomes easy to understand why it is so important to take steps towards cybersecurity.

7. I only go to mainstream sites, so I don’t need security software

You need security software no matter where you go. Remember what I said earlier, about how social media apps sell your data to make their money? The more cookies you have in your browser, the more your every step is being followed.

When multiple sites have a detailed profile of you, that increases your chances of getting your data breached, since all companies are vulnerable to a data breach. Security software keeps you safe. It’s like two-factor authentication: a necessary step towards protecting your privacy.

RELATED: 3 security programs that should be on every computer and laptop

8. I use complex passwords

Even a long, complicated password isn’t enough to keep you safe in today’s security landscape.

Nowadays, there are speedy programs people use to run billions of password combinations — and it only takes a second to run these potential passwords. Not only that, but hackers have sophisticated methods for identifying passwords we use in password creation.

That’s why you should also use password managers as well as two-factor authentication.

9. I know a fake voice when I hear one

You’ve probably heard that scammers will call you with robotic voices, pretending to be the IRS. They demand money. Maybe you’ve gotten one of these calls yourself. You may think you can recognize a robotic voice, but unfortunately, robocallers are improving their techniques.

Deepfake technology can replicate more than just faces. It’s also expanding into voices. Online programs need only to hear your voice to create a close copy.

10. I will know when something bad gets in my device or computer

Cybercriminals’ work is stealth. When they’re doing their deeds, there’s no red flag that pops up. They have intricate ways of infiltrating your data; there could even be Trojan horses in the form of viruses lurking in your code right now.

Now that you’re aware of the 10 most common cybersecurity myths, you’re better equipped to recognize misinformation spread by hackers who want to keep you vulnerable.

Remember, your data is worth a lot to cybercriminals, so take steps to protect it. Make sure all of your gadgets are up to date with all the security patches needed to fend off online attacks.

Make use of robust security software, password managers, and two-factor authentication. Most of all, follow news on recent breaches and hacking trends to keep your security tools reliable and timely.

On my website, we have a busy Q&A forum where you can post your tech questions and get answers you can trust from real tech pros, including me. Check it out and let us solve your tech issues.

Call Kim’s national radio show and click here to find it on your local radio station. You can listen to or watch The Kim Komando Show on your phone, tablet, television or computer. 

Kim Komando

(Unsplash Photo)...
Kim Komando

5 clever ways to use Echo and Alexa that you’ll wish you knew sooner

Let's jump into five smart ways smart assistant Alexa can enhance your life, starting with your home's security.
5 days ago
(Pixabay Photo)...
Kim Komando

Money-saving secret cable and internet providers don’t want you to know

If you’re heading off for a long trip, spending time in a seasonal home or otherwise away, here’s a smart way to save money: Pause your cable and internet.
6 days ago
(Unsplash Photo)...
Kim Komando

How to wipe your phone or computer if it’s lost or stolen

Don’t let everything stored in your phone or laptop fall into the wrong hands. Here’s how to wipe all that personal info from anywhere.
13 days ago
(Unsplash Photo)...
Kim Komando

This one hidden Google shortcut will save you time every single day

Most of us know at least some basic keyboard shortcuts, but there are more ways to cut to the chase beyond a few keystrokes.
20 days ago
(Pixabay Photo)...
Kim Komando

5 major tech annoyances and how you can fix them

In the spirit of living a better digital life, here are five smart ways you can use your gadgets to cure some of life’s little annoyances.
27 days ago
(Pexels Photo)...
Kim Komando

3 tech steps you should have in place before you die

It’s a grim topic, but in today’s digital age, we have to plan for what happens to all our online accounts, data, notes, photos, videos, websites, playlists, blogs, and subscriptions once we’re gone.
1 month ago

Sponsored Articles

Carla Berg, MHS, Deputy Director, Public Health Services, Arizona Department of Health Services

Vaccines are safe if you are pregnant or breastfeeding

Are you pregnant? Do you have a friend or loved one who’s expecting?
Christina O’Haver

BE FAST to spot a stroke

Every 40 seconds—that’s how often someone has a stroke in the United States. It’s the fifth leading cause of death among Americans, with someone dying of a stroke every 3.5 minutes.
Arizona Division of Problem Gambling

Arizona Division of Problem Gambling provides exclusion solution for young sports bettors

Sports betting in Arizona opened a new world to young adults, one where putting down money on games was as easy as sending a text message.
Here are the 10 cybersecurity myths you need to stop believing