WATCH: Record High 15.4 Million Victims Lost $16 Billion In Identity Fraud Incidents Last Year

VIDEW - Your personal information is not safe.

That’s the conclusion of a study from Javelin Strategy and Research that highlighted the prevalence of cyberattacks in 2016.

According to the report, a record high 15.4 million victims lost $16 billion in identity fraud incidents last year.

More than ever before, it’s important that you take action to protect your personal information.

Follow these tips to reduce your risk of cyberattack:

Be Up-To-Date

  •  Outdated software may expose you to viruses, malware, ransomware and other kinds of attacks. It’s important to keep updating your software as the developers release new versions, especially after a vulnerability is found.
  •  Always upgrade to the most recent version of the operating system on your computer and mobile devices. With Microsoft PCs, enable the autoupdate option in Settings.
  •  On Macintosh computers, look for “Check for Updates” under the Help menu in the Finder. (Major Mac operating system updates will also pop up in the App Store.)
  •  On your mobile devices, look under Settings to see if an update is available — iOS updates will come directly from Apple, but Android updates might come from your mobile carrier.

This cool post and other interesting ones can be found at the source.

Source: NBC

Topics: Speaking Engagements, stealing passwords, updating software, autoupdate option, identity fraud, cybersecurity expert, Javelin Strategy and Research, information protection, malicious wireless network, the Cloud, VPN service, WiFi, cyberattacks, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›
tech-texture-bg