How to make a strong password 0 158

How to make a strong password

Original Source: We Live Security

Previous ArticleNext Article

ESET’s top 5 tips for safe online shopping this festive season 0 288

safe online shopping

Holiday shopping is so quick and easy to do online, no traffic to get to the store, no waiting in queues or travelling to one specific shop just to find out – oh no, they’re out of stock of the one item you went there for.

We want to make sure your holiday shopping experience is quick, easy and most of all safe. Here are our top 5 tips for safe shopping this festive season:

  1. Don’t have the same passwords for all online shopping sites, have strong passwords and for extra security, change them before the holiday shopping commences.
  2. Only shop on trusted sites and directly from vendors.
  3. Don’t click on links from emails, instead go straight to the site on your browser.
  4.  When shopping online use a secure internet connection such as your home WiFi and make sure the necessary firewalls are in place – Avoid online payments via public WiFi.
  5. This coupled with a strong antivirus and/or anti-spyware software for scanning email, applications, and data that resides on your computer, you can rest assured that only you will catch or detect any form of intrusion in good time.

To find out how ESET can help secure your online shopping experience visit our website or contact us at sales@esetafrica.com

 

ESET Security for IoT 0 218

IoT

IoT is a phrase used often in the cyber security space, but what does it really mean? IoT stands for Internet of Things and to put it simply, refers to any device that can be connected to the internet. This is no longer just computers or cellphones but also refers to Smart TV’s and fridges, coffee machines, headphones, speakers, wearable tech, cars and soon enough, pretty much anything.

A more formal definition of IoT given by TechTarget

The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

With all of these connections, IoT provides endless opportunities but also poses dangers.

These dangers include:

  • Your devices being used to spy on you using capabilities such as cameras or voice recording software
  • Devices being hacked to obtain personal information or to take over functionality of the device
  • In addition to this, having multiple devices connected to the internet opens further opportunities for these devices to bypass firewalls and access other devices on your network.

To help protect your IoT devices, your home network, and even your favorite shopping or social website—ESET has enhanced the Connected Home Monitor feature within its recently released home products, available to try or upgrade to for free.

How the ESET connected home monitor addresses these dangers

The ESET connected home monitor includes IoT vulnerability detection, a router-connected smart devices test, and a catalog list of connected devices on your network.

Connected home monitor

The enhanced feature is continuously updated to detect and alert you to new devices connected to your network, as well as the latest vulnerabilities affecting your devices. If a vulnerability is found in a device, ESET will report the cause and possible steps you can make to fix it, such as changing default configurations or updating the device’s firmware from the manufacturer.

Start protecting your home today with ESET’s home security products – click here.