Connect with us

Hi, what are you looking for?

HEADLINES

Converge shares pointers for better online defense vs. scams, attacks

During a recent webinar on Building Resilience Against Online Scams, hosted by fiber broadband and technology provider Converge ICT Solutions Inc., its Chief Executive Advisor and technology expert Eugene Yeo shared valuable insights on how to effectively defend ourselves against scams. 

In today’s digital age, cybercriminals are constantly on the lookout for opportunities to exploit internet users. Especially now with the help of advanced technologies, such as artificial intelligence (AI), to make attacks more scalable and efficient, cyber citizens are more vulnerable than ever, from phishing schemes to identity theft, among others. 

However, by understanding these threats and implementing proactive measures, we can significantly enhance our online safety.

During a recent webinar on Building Resilience Against Online Scams, hosted by fiber broadband and technology provider Converge ICT Solutions Inc., its Chief Executive Advisor and technology expert Eugene Yeo shared valuable insights on how to effectively defend ourselves against these. 

He emphasized that the first step when it comes to online protection is to understand how attackers operate.

Advertisement. Scroll to continue reading.

“The first question has to be how we are attacked. We need to understand that there are so many tools out there that are not just targeted towards you but also towards everyone around you. This is important for us to know because even if we install antivirus on our computers, or even if we ignore suspicious emails, these are no longer enough,” Yeo pointed out.

He then offered several tips for building a strong personal defense against cyber attacks:

1. Be mindful of what you share online

Social media platforms like Facebook, Instagram, and X encourage users to share extensive personal information, often without considering the potential consequences. Yeo cautioned that cybercriminals can exploit this information for a variety of malicious purposes. 

He encourages users to think critically about the personal information they post. These are not limited to names, birthdates, and contact information but include details about family members, friends, and real-time locations, which can also inadvertently compromise safety.  

Advertisement. Scroll to continue reading.

“As much as we all love social media, every information that you put there is information that the attacker can use. Perhaps your birthday, your families and your connections, perhaps where you are at this point of time – all these are critical pieces of information that an attacker would leverage on in order to really compromise,” Yeo advised.

2. Be generally aware

Maintaining vigilance while online is vital to reducing our risk of becoming a victim of cybercrime. This means being skeptical of unexpected messages and practicing safe browsing habits. 

“Be careful when you receive emails that look legitimate like emails from your bank. Double check it. Try not to click on links in emails. Try to go to the official site and go through the right process instead of taking the shortcut. Try not to click any links in emails and text messages. Go through the official path,” Yeo said.

3. Think like an attacker 

Advertisement. Scroll to continue reading.

Yeo added that understanding how cybercriminals think can greatly enhance our defense online. By putting ourselves in their shoes, we can better secure our information as we realize particular weaknesses that could be targeted, he said.

“As we think like an attacker and think of how they’re doing it, it will really help us understand how we should better approach the defense,” said Yeo.

4. Engage and Educate Your Circle

Given that our family and friends can also be taken advantage of for illicit activities, it is essential to employ comprehensive protection. Yeo highlighted the importance of sharing knowledge to family and friends to safeguard even our extended network.  

“To verify, you can use a safe code between friends or family members that when they hear this code that you’ve agreed to, they know it’s you. It’s very important to think like this to add layers to protect not just yourself, but the circle around you,” Yeo encouraged.

Advertisement. Scroll to continue reading.

With these in mind, Yeo reminded participants that while the digital landscape poses new challenges due to advancements in technology and AI, there are effective approaches we can use to stay safe on the internet. Embracing these steps allows us to take control of our online safety and empower others to do the same.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

In 2024, Kaspersky restructured its Partner Program into four key partner types, recognizing the diverse profiles within its network – from traditional resellers and...

White Papers

The study tested 2,000 UK and US consumers, exposing them to a series of real and deepfake content. The results are alarming: only 0.1%...

HEADLINES

Deepfakes pose significant threats and risks, with nearly half of companies worldwide reporting incidents in 2024, according to industry reports. HONOR’s innovative solution immediately...

HEADLINES

Converge ICT Solutions Inc. has taken on the responsibility of empowering the next generation with the knowledge required to navigate the digital world safely.

HEADLINES

The Philippines’ global ranking for local threats rose from 76th to 66th, highlighting the need for stronger cybersecurity measures.

HEADLINES

Despite 65% having adopted generative artificial intelligence (GenAI capabilities), 89% of IT leaders are concerned that flaws in GenAI cybersecurity tools could put their...

APPS

PSBank is reinforcing its commitment to security through key enhancements to its PSBank Mobile app.

White Papers

Hyper-personalized attacks and agent AI subversion will require industry-wide effort to root out and address. Business leaders should remember that there’s no such thing...

Advertisement