Five Tips for Safe Web Surfing, Whether at Your Desk or On-the-Go

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Tips for Safe Web Surfing, Whether at Your Desk or On-the-Go-6 Next

  • Remember, the same dangers that exist on the Web (i.e., Black Hat SEO poisoning, social media, email and SMS) can also exploit a mobile device. Remain vigilant about all mobile Web surfing activity.
  • Avoid downloading apps from unknown sources and instead seek out official marketplaces. If you are downloading an app from an established marketplace, learn what others are saying first about the app in the review section. Be aware of the permissions an app is asking for during install.
  • Nearly all smartphones are now equipped with Wi-Fi functionality, making them highly vulnerable to attacks. There are various tools available that allow even the least talented hacker to exploit Wi-Fi hotspots and intercept Web traffic. Avoid accessing any password-protected site or one where you will give any personal information (i.e., Facebook, banking, PayPal) when connected to an unsecured Wi-Fi hotspot, such as those in a coffee shop or at the airport. Businesses should seek a Web filtering solution that will guarantee Web protection and policies remain active in such harsh environments.

You've heard it before: Create stronger, better, more unique passwords. But it doesn't stop there. Courtesy of AppRiver, we bring you five must-heed tips to help your users securely conduct their daily Web activity from app downloads to bill pay, Web browsing, email checking and more.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.