The rule of law class represents @ everyone. Have you blocked these "loopholes" in network security?
2021-10-13
2021 network security publicity week is coming! How much do you know about the "loopholes" in network security? Do you know how to protect your personal information? Representatives of this legal course popularize network security knowledge and say no to security vulnerabilities and hidden dangers! Vulnerability 1: Disclosure of personal sensitive information at will One photo can reveal the information of all family members, which is easy to create opportunities for criminals to cheat and steal, especially the information of the elderly and children. Pay more attention to protection, including names, kindergarten and school addresses. 1. Drying baby should pay attention Some parents who love to expose their children do not turn off the setting of "nearby people" in wechat. Swindlers can easily obtain their children's information by searching "nearby people" through wechat. 2. The itinerary should be kept confidential When going out, the schedule, whereabouts and other information shall be kept confidential, and criminals shall not be given the opportunity to steal. Therefore, during the period of travel, you can display your name, ID number ticket, passport, air ticket, etc. 3. Protect your privacy Try not to show obvious features in the photos, such as your home key, license plate number, ID card, driver's license, passport and other documents. Vulnerability 2: The password is too simple or all accounts use the same password We are not unfamiliar with passwords. We need to enter passwords whenever we log in to forums, e-mail, websites, online banking or withdraw money from the bank. The security of passwords is directly related to our work data, personal privacy and property security. The following points should be noted: 1. Do not use the same password for all accounts 2. Important accounts should use more secure passwords 3. You can set a simple password for occasionally logged in forums 4. Complex passwords are required for daily e-mail, online banking and company information systems 5. Do not set the same password for forum, email, online banking and information system accounts Here are some tips to teach you: First form phrase splicing Familiar phrases, preferably with numbers and letters, combined with case; For example, "5g era @" converts the password "5gshidai @" The second form is whole sentence scattered words Use your favorite poetry Pinyin initials plus numbers and special symbols to form a password; For example, the first letter of "natural material must be useful" plus numbers and special characters form a password“ tswcbyy@6 ” Third type number for text Chinese characters can be replaced with corresponding Arabic numerals, such as "spring breeze in February is like scissors" and converted into password "2ycfsjd@" The fourth formula matches Chinese and English Choose a familiar sentence, part with Pinyin, the rest with English words, and combine numbers and special characters. Such as "I love work" and "wo love" work@7 ” Vulnerability 3: Use public Wi Fi without a password In order to meet the demand of Internet users for mobile Internet access, many businesses are now equipped with Wi Fi to attract consumers. Although "public Wi Fi" is convenient, it also has many security risks. Hackers like to set an ambush in "public Wi Fi". Netizens will be caught accidentally, ranging from loss of money to disclosure of all personal information. How can mobile phones safely use "public Wi Fi"? Here are some tips to teach you: 1. Phone settings prohibit automatic Wi Fi connection 2. Reject Wi Fi from unknown sources 3. Use security software to detect Wi Fi 4. Do not use unfamiliar Wi Fi for online shopping 5. Beware of multiple Wi Fi with the same or similar names in the same region Vulnerability 4: Relax your vigilance against phishing emails from "Acquaintances" Phishing e-mail refers to a network attack in which hackers disguise themselves as trusted people of users such as colleagues, partners, friends and family, induce users to reply to e-mail, click on malicious links embedded in e-mail, or open e-mail attachments to implant Trojans or malicious programs, so as to steal users' sensitive data. To prevent phishing e-mail, we should do the "five essentials": anti-virus software should be installed; The login password shall be kept confidential; The email account should be bound to the mobile phone; Public and private mailboxes should be separated; Important documents shall be protected. Also, don't trust the "display name" displayed in the sender's address. Because the display name can actually be set arbitrarily, pay attention to reading the full name of the email address; Don't easily click on the link in a strange email; Don't relax your vigilance against "acquaintance" emails. If you receive an email from a trusted friend or colleague and you doubt the content of the email, you can call them directly to verify it. Vulnerability 5: Scan QR codes on websites or apps with unknown sources In the era of mobile payment, scanning QR code has become the most common thing in our life. However, these two-dimensional codes look convenient, but if you are not careful, you may have to pay the price of money loss. Here are some common QR code fraud tricks: 1. When shopping in the mall, when you meet a "salesman" who says that "scanning the QR code" can give free goods, you must not scan the code with the idea of "don't waste it". Some criminals take advantage of this psychology to induce victims to scan QR codes in various ways. The victim logged in to the preset website and automatically downloaded the Trojan virus without knowing, resulting in the theft of personal information and online banking password. 2. Some criminals will send you a QR code through wechat, falsely claiming to scan the QR code to help brush the reputation of Taobao store and get a commission. Once citizens enter their mobile phone number and bank account number, the balance in wechat wallet will be transferred away soon. 3. Someone saw the "illegal parking ticket" on the window. There is a QR code at the bottom of the list. If the owner scans the QR code to enter, a 200 yuan transfer interface will appear on the screen. This means is more confusing than traditional fraud, the masses are easily deceived, and the social harm is quite great. Therefore, we must carefully screen the network virtual identity. We must not believe the QR code with unknown origin. When filling in the account and password, we must verify the authenticity of the other party's identity and beware of being cheated. Once the money is transferred, call the police in time. (outlook new era)
Edit: Responsible editor:
Source:
Special statement: if the pictures and texts reproduced or quoted on this site infringe your legitimate rights and interests, please contact this site, and this site will correct and delete them in time. For copyright issues and website cooperation, please contact through outlook new era email:lwxsd@liaowanghn.com