Contributed By

CB Logo 4

Community Editorial Team

at Comcast Business

View Profile

5 Simple Steps Will Help Minimize Your Personal Cyber Risk

May 18, 2017

Follow these steps to minimize your cyber risk.

WikiLeaks recently published what appears to be a huge repository of hacking information, tactics and exploits that was allegedly sourced from the CIA and NSA.

The quantity of information released exceeds the total amount of pages released. According to reports, the trove of published information did not include the actual applications that were used for these exploits, but rather discussions and commentary about how to gain control of various business and consumer devices. WikiLeaks has thus far agreed to not release the actual software repositories used, until some sort of consensus emerges from the public and private sector.

Fortunately none of the attacks were about mass surveillance, such as targeting infrastructure of internet giants like Google, Apple, Amazon or Facebook, but really focused on the end user and monitoring specific endpoints. However, it’s certainly going to add more fuel to the ever-growing security fire.  

But it is not all doom and gloom, there are certain simple steps that we can all take to help minimize our personal cyber risk.

• Don’t trust the public internet. Rogue access points are more common than you think (just ask some of the RSA 2017 Security Conference attendees).

• Change the default passwords on new IoT devices day one! Avoid joining the DDoS botnet!

• Update your IoT appliance firmware/software frequently. The “Weeping Angel” Samsung TV attack described in the CIA wikileak was only a problem on non-upgraded firmware.

• If you are not using an application, delete or uninstall it. Applications are just attack surfaces waiting for attackers.

• Enable multi-factor authentication where ever possible and move to an online password manager to help you deal with the 20+ passwords that every internet user manages (usually on a piece of paper).

This article originally appeared on Broadsoft

Photo credit: Visual Content via VisualHunt / CC BY

This article is available exclusively to
Comcast Business Community Members.

Join the Comcast Business Community to read this article
and get access to all the resources and features on the site.

It's free to sign up

OR

Join the Discussion

300 Characters Left
2.comcast-ctas-Network-Security[1]

Resource Center

Why Comcast
Comcast Business delivers fast, reliable networking solutions built for business performance and growth

Current Offers
Take advantage of our limited time offers with a customized plan built to give your business an edge over competitors

Community Forums
Find solutions, share knowledge and get answers from customers and experts

Help & Support
Get help and support from Comcast experts

Resource Library
Find out how Comcast has helped clients like you meet their needs with informative White Papers, Case Studies and more

Internet Speed Test
Try the Comcast Business Internet Speed Test to see how your business stacks up

Social Media
Connect with Comcast and join the conversation on LinkedIn, Twitter, Facebook and Google+