
However, hackers are still making use of Macros hidden in MS Office documents to spread malware. Most of these were through Javascript attachments, which have been recently disallowed by Google’s email service provider, Gmail. No matter how genuine they appear to be, avoid clicking on links inside an email and never download an attachment from them.Īccording to a threat report by ProofPoint, there is a 230% increase in the volume of malicious attachments sent through email per quarter. Dealing with Emails from Unknown Sendersĭo not trust emails from strangers. Transmitting confidential data in plain text over email or chat messenger can also lead to hacking attempts. So, avoid publishing any sensitive information or private content even if it’s just for fun as it may lead to embarrassment later.

This includes an index copy with search engines, website cache, downloads of a file by some person or even a screenshot taken in case it was capturing text or images. Several copies of a single piece of content are made automatically within minutes. It cannot be undone or removed in most cases. Post Sensibly and ResponsiblyĪnything you post on the internet is permanent. Read more about the differences between antivirus and anti-malware to decide the need and importance for yourself. It uses advanced techniques like Behavior Blocking and Intrusion Prevention to detect unknown malware. Your best weapon in this case is anti-malware protection. Antivirus mainly depends on a virus signature database to tackle cyber threats, which makes it basically useless. There is no doubt that this is a good practice, but there is a real need to rethink this commonly accepted belief.Īccording to a Webroot report, 97% of malware is unique to a specific endpoint, rendering signature-based security virtually useless. There is a firm belief among most experts that you should not browse the internet without having an antivirus program installed on your computer system.

In this article, we will focus specifically on the netiquette to be followed to ensure cyber-security. It can be defined as the set of rules for the correct and acceptable way of communicating on the Internet. Netiquette is short form for Network Etiquette.
