WATCH: Record High 15.4 Million Victims Lost $16 Billion In Identity Fraud Incidents Last Year

VIDEW - Your personal information is not safe.

That’s the conclusion of a study from Javelin Strategy and Research that highlighted the prevalence of cyberattacks in 2016.

According to the report, a record high 15.4 million victims lost $16 billion in identity fraud incidents last year.

More than ever before, it’s important that you take action to protect your personal information.

Follow these tips to reduce your risk of cyberattack:

Be Up-To-Date

  •  Outdated software may expose you to viruses, malware, ransomware and other kinds of attacks. It’s important to keep updating your software as the developers release new versions, especially after a vulnerability is found.
  •  Always upgrade to the most recent version of the operating system on your computer and mobile devices. With Microsoft PCs, enable the autoupdate option in Settings.
  •  On Macintosh computers, look for “Check for Updates” under the Help menu in the Finder. (Major Mac operating system updates will also pop up in the App Store.)
  •  On your mobile devices, look under Settings to see if an update is available — iOS updates will come directly from Apple, but Android updates might come from your mobile carrier.

This cool post and other interesting ones can be found at the source.

Source: NBC

Topics: stealing passwords, updating software, autoupdate option, identity fraud, cybersecurity expert, Javelin Strategy and Research, keynote speaker, information protection, malicious wireless network, the Cloud, VPN service, WiFi, cyberattacks, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›

Understanding Post-Inoculation Cybersecurity Attack Vectors

If you’ve recently improved your cybersecurity posture, you should know that the work to protect your company’s data is not over.

Read more ›

Password Management Best Practices: How Secure Are Password Managers?

Password managers are convenient tools for storing, organizing, and accessing passwords. But are they safe from cyber attacks?

Read more ›
tech-texture-bg