The need to shift from telecommuting to personal computers caused by the coronal disaster has increased. On the other hand, due to the impact of the corona disaster, the suspension of the production line and the increased global demand for semiconductors are also related, and personal computers are not available. As a result, many users use their dormant computers, such as their own homes and companies, for remote work.
If newly bought computers and dormant computers are directly used for remote work, security measures are often not good enough. In fact, cyber attacks against personal computers with this vulnerability have also been identified.
The Cyber Security report for the first half of 2021 released by Canon Marketing Japan in September 2021 shows that particularly eye-catching telecommuting-related cyber attacks in the first half of 2021 can be divided into the following two types:
The number of malware detected in China in the first half of 2021 TOP3 is all malware executed on Web browsers, of which the most is the advertising software "JS/Adware.Agent" that displays illegal advertisements. If you accidentally click on an illegal advertisement, it may be induced by phishing sites, and be falsely used personal information.
The representative of an attack aimed at office software vulnerabilities is the abuse of Acer. Although this is a method of attack from a long time ago, it has been successful recently, and Word's macros have also been used to spread the previously raging "Emotet". In addition, more and more attacks are difficult to deal with if they do not take vulnerability measures, such as "DOC/Fraud", which will be infected by simply opening files.
In addition, attacks against network peripherals, such as VPN (Virtual Private Network) used to remotely operate the workplace environment in telework and attacks against RDP (Remote Desktop Protocol) vulnerabilities, will be listed. The use of dormant computers needless to say, even newly purchased computers, if not properly taken security measures, the risk of being damaged by such cyber attacks will be increased.
新しいパソコンを買った時にやっておきたいセキュリティ対策は?In order to protect your computer from cyber attacks, it is important to take the following five basic security measures.
It is not advisable to set the computer login password to "123456" or "000000", which is easy to guess. When setting a password, you want to set more than 15 characters of letters, numbers, symbols and other complex and difficult to guess the existence of the password. Recently, the number of personal computers corresponding to biological authentication such as fingerprint authentication and face authentication has increased, and the convenience has been improved. However, like the PIN code of Windows10, it can also be authenticated by entering a password (password) when there is an authentication error. Therefore, it is desirable that passwords (passwords) also have high strength.
In addition, when using Wi-Fi, that is, wireless LAN, it is also indispensable to confirm the security settings of Wi-Fi routers, proper encryption and restrictions on connecting devices.
セキュリティを高めるために知っておくべきパスワード管理の基本Computers, like smartphones, need to be updated quickly after updates are released on operating systems and software. Once an attacker discovers a vulnerability, it will aim at a very short period of time for the application to be updated, so the earlier the update, the better.
It can be said that the introduction of security software that can achieve comprehensive security countermeasures is also necessary. For example, ESET Internet security not only has the detection and elimination of malware, but also has the functions of firewall and phishing fraud countermeasures, so it can protect personal computers from a variety of network attacks.
It is also important to know the support period of the operating system when reusing a previously used computer that is temporarily unused and dormant. Extended support for the operating system has even been terminated in Windows7 and Windows8. The end of extended support is that even if a vulnerability is found, it will basically not be updated to eliminate it. For Windows8.1, the main installation support was also terminated on January 9, 2018, and the extended support will end on January 10, 2023. If a high-risk vulnerability is found, an exception update may occur after the end of extended support, but always identify it as an exception.
We hope you will realize that there is a great security risk in continuing to use computers that support closed operating systems, and to use computers with operating systems that support continued versions.
Regular data backups are also important. In case of infection of malware is difficult to drive out, if there is a backup, it can also be judged to initialize the ontology. In addition, even if you are infected with blackmail software that takes data hostage, if there is a backup, you can initialize and recover the data from the backup, so the damage can be minimized.
Note that after Windows10, Windows Defender provides a variety of security functions as a security center. However, in the case of users who are uneasy about the capabilities and skills of IT, it is also worth considering not to hand it over to Defender and to use security software with additional support.
Windows 10のマシンにウイルス対策ソフトは不要か?Failure to take the above measures may result in the following risks:
After being infected with malware, not only the delay of computer action and the unveiling of suspicious pop-up will occur, but also all kinds of damage will occur, such as the leakage of personal and confidential information led by the destruction of data, the infection of other devices connected to the network and so on.
If login information is leaked from a malware-infected computer, or if a user's account is hijacked by a social hacker, remote operations can do a lot of damage. There are also cases of being hijacked and participating in DDoS attacks when they do not know the use of low-frequency personal computers.
The back door is the entrance for the attacker to invade the system, that is, the back door. As a way to set the backdoor, it has been used since ancient times to add a Trojan horse to the downloaded program. In addition, there are situations caused by human error, such as forgetting the back door deliberately created for the testing of the application, etc. When the back door is installed, attackers are free to enter, and there are concerns about leaking confidential information and springboards such as DDoS attacks.
If security measures are ignored, these risks can lead to huge damage, such as information disclosure and fake writing on forums, as well as the illegal use of online payments.
Through the proper implementation of the five security measures described above, the security against network attacks is improved. Although they are all basic countermeasures, it is very important to carry out them practically because they are basic.
On the other hand, as important as its countermeasures is the security awareness of users who use computers. The attachments of emails received by unknown objects cannot be easily opened, and suspicious links to emails, SNS and chat are not clicked, so basic security awareness and reading and writing skills become important.
Attackers are increasingly ingenious in using tactics to disguise themselves as a natural situation in an attempt to deceive users.
Please maintain a high degree of security awareness, while referring to this cyber security intelligence agency information website, while grasping the latest cyber attack-related techniques and cases, and daily information collection.
Navigation Lists
Telecommuting increases the demand for computers and the use of dormant computers Five basic security measures when using a computer The danger in the use of computers caused by incomplete security measures It is important to raise safety awarenessCategory
Related Articles
Hot Articles