PDF EDITED-CR 93 TASK 1.9 ESSAY ON HOW TO PROTECT ONESELF ON CYBERCRIME - Edited

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

TASK1.

9: CDI109: ESSAY ON HOW TO PROTECT ONESELF AGAINST CYBERCRIME

As we know, Cybercrime is an illegal activity that targets individuals or users of computers,


networks, and devices. An individual operates it, a group of persons, or an organization who are skillful
in computer programming, and they doing the illegitimate means to gain mainly money from extorting
the confidential information of their target, phishing, ransomware, and the like. Here are the following
tips on how to protect ourselves from Cybercrime;
• Keep software and operating systems updated – the computer and device users should
update their respective gadgets to enhance their security against cybercrime attacks. We
cannot deny that criminals also upgrade their means to perform Cybercrime, especially
their computers and software.
• Use anti-virus software and keep it updated – what is the good thing about it is that the
anti-virus software helps to enhance and assess computer security protection against any
malware attacks found on attached online, emails, downloaded files, and software the
like. These anti-virus software help scan, detect, and remove the malicious virus on the
user's computer system, which causes harm, worst, gets the user's confidential
information.
• Use strong passwords – it is indeed that any user's access in the internet world especially
when they create an account on a particular website, the user should take advantage to
let the manager generate user's password. Wherein fact, it creates a solid password that
is hard to guess by anyone who had the intention to do Cybercrime to their targets.
• Never open attachments in spam emails – cookies, subscribing to any websites which
give weekly notifications, unable to activate, blocking the third party cookies or
unnecessary notifications, and the like. These are the way to trick and attempt their
targets by sending emails containing malicious attachments that may infect the computer
system or network worst corrupt and gain.
• Do not click on links in spam emails or entrusted websites – mainly arises on any
websites which we mostly visit, and these links spams and entrusted websites blend on
what the user's purpose of visiting. It will attempt to click worst. Ones responded to the
bait now fall to the wrong hands.
• Do not give out personal information unless secure – giving of personal information in
accessing any websites, especially if it is not familiar to the user it may lead to being
victimized of Cybercrime. In a way, mainly the websites would ask for information if
the user is new and wanted to create a new account, and once noticed a lot of filled
boxes to fill in despite its minimal service. Not only that but also mobile apps also a lot
of accessed ways to happen in user's phone despite small service on that app is needed,
and much consent to access is arise to access user's phone.
• Companies directly about the suspicious request – one of the wisest ways to be made,
especially if an unknown or known company called on, by dialing their official number
of that company so that there would be a match of callers which is only one person.If
different call receiver, then probably one is the criminal.
• Be mindful of which website URLs you visit – whether using gadgets or computers in
accessing online websites for any user's purpose. Users should notice, especially those
spam websites that mostly happen on Google browser despite blocking the cookies,
making traffic. In order that the user will not be tedious intake noting or mindful of
those websites, they can use a well-trusted browser that traces and blocks unnecessary
Ads or websites or install browser extensions on chrome web store.
• Keep an eye on your bank statements – the individual can be familiar with its bank
transactions, especially on the inquiry statements that need to fill in. In some cases,
criminals copy the identity of the transactions of the bank statement in order to get the
vital information, and worst they could access an individual's bank account then gain.

You might also like