Télécommunications

Most popular cybersecurity myths BUSTED! | NordVPN



💥BEST VPN for 2022 | Get NordVPN NOW 💥
✅ Recommended by PewDiePie + Troy Hunt ✅
CLICK HERE for NordVPN YouTube DEAL 👉🏻 https://content.nordvpn.com/3Td8um9

***

The internet is full of cybersecurity myths that can put you at risk. In this video, a cybersecurity expert debunks cybersecurity myths so you can feel safe when surfing the web. Check out this video and find out how much you know about cybersecurity!

***

00:00 Intro
00:18 Shady websites
00:35 Smartphone security
00:51 Using an antivirus
01:09 Malware on your computer
01:29 Hackers won’t target me
01:55 Passwords

***

How much do you know about cybersecurity? Let’s test it!

Myth: I never go to shady websites, so I’m not at risk.
Busted: Hackers don’t need to rely on your browser to attack you. Many malware attacks are initiated when the user clicks on a suspicious link in their inbox.

Myth: I’m completely safe on my smartphone.
Busted: Unfortunately, you’re not. Does your device have anything resembling an operating system? Then it can get hacked. No matter what the device looks like.

Myth: My antivirus has got me covered, so I don’t need to worry.
Busted: Using an antivirus is great! But unfortunately, viruses are not the only threats online. Social engineering attacks can do just as much damage.

Myth: I know my computer and would notice if it were infected.
Busted: A lot of malware is sneaky. It’s not all flashy “YOU’VE BEEN INFECTED” warnings. It can lay dormant for months until you accidentally do something to activate it. Or it can run in the background for months without ever being noticed.

Myth: Hackers aren’t interested in what I’m doing, so they’re not going to target me.
Busted: That’s partly true. A criminal isn’t necessarily interested in hacking you specifically. But that doesn’t mean you can’t get hacked. Cybercriminals usually cast a wide net targeting hundreds, sometimes thousands, of people. Those with fewer security measures are simply more likely to fall victim to a cyberattack.

Myth: A strong password is all I need.
Busted: Having a strong password is a great start. But it’s not enough, especially if you ever reuse it for other accounts. If cybersecurity is starting to sound like a bit of a headache, I get it. But don’t panic just yet — you have plenty of choices to help improve your online security. For example, using a password manager will help you protect EVERY account you have with a strong and unique password! Meanwhile, an app like NordVPN will secure your device while you surf the net!

***

About NordVPN
NordVPN is the world’s leading VPN provider and the flagship service of Nord Security. We aim to provide internet users with all the necessary online security tools.
What is a VPN? VPN is short for virtual private network. It’s a service that protects online activity and changes IP address and virtual location.

***

Grab the Deal! 🏃 https://content.nordvpn.com/3Td8um9

***

Check out NordVPN’s German and French channels to enjoy top-notch cybersecurity content in your native language! ⏯️ 🌐
🇫🇷 @NordVPN en français
🇩🇪 @NordVPN auf Deutsch

***

#NordVPN #CybersecurityMyths #Cybersecurity

Views : 402
cyber security

Source by NordVPN

Mourad ELGORMA

Fondateur de summarynetworks, passionné des nouvelles technologies et des métiers de Réseautique , Master en réseaux et système de télécommunications. ,j’ai affaire à Pascal, Delphi, Java, MATLAB, php …Connaissance du protocole TCP / IP, des applications Ethernet, des WLAN …Planification, installation et dépannage de problèmes de réseau informatique……Installez, configurez et dépannez les périphériques Cisco IOS. Surveillez les performances du réseau et isolez les défaillances du réseau. VLANs, protocoles de routage (RIPv2, EIGRP, OSPF.)…..Manipuler des systèmes embarqués (matériel et logiciel ex: Beaglebone Black)…Linux (Ubuntu, kali, serveur Mandriva Fedora, …). Microsoft (Windows, Windows Server 2003). ……Paquet tracer, GNS3, VMware Workstation, Virtual Box, Filezilla (client / serveur), EasyPhp, serveur Wamp,Le système de gestion WORDPRESS………Installation des caméras de surveillance ( technologie hikvision DVR………..). ,

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *