Welcome to Woman In Cyber Security

According to UN research, women are increasingly becoming victims of cyber-attacks

by Magda CHELLY December 31, 2017

This platform is built to empower women in cyber security. However, let’s advise other women, as well.

The Internet is a wide space, where women can face various challenges, including cyberbullying or cyberstalking. There are ways to improve their online security. Symantec has shared some of the good tips, helping women to preserve their online identity and safety.

According to UN [...] research, women are increasingly becoming victims of cyber-attacks. This is due to an important usage of the Internet. Women build relationships and maintain them over the cyber space. Unfortunately, this only means an increase of the risks of a cyber-attack, identity theft or even fraud. It turns out that especially young women, aged between 18-24, experience this type of activities. 26% of them were victims of online stalking and 25% of online sexual harassment. These threats will continue to increase with the increase of connectivity.

The most important online safety rules provided by Symantec specialist to help Internet users are:

Do not share or reveal passwords: Passwords need to be kept secure, and private. It is important not to share them even with close ones.  Already 2/3 of users believe that it is riskier to share a password than to rent a car. This conclusion is definitely justified.

Disable or cover your webcam - there are many applications that are able to launch remotely the webcam and record your video without your knowledge or consent. As a precautionary measure, just cover your camera.
Do not send more than necessary: Be very cautious when discussing with third parties over the Internet. Do not trust strangers, and do not share with them personal and confidential information or pictures. A picture with your fingers with a distance less than 3 meters allow to duplicate your fingerprint. Be very careful in virtual relationships.

Always meet in a public place, after an online relationship. Make sure that a friend is nearby and available in case of necessity - a shopping center or a café. Make sure that your relatives know where and with whom you plan to meet.

Turn off the location service on your phone, turn on your pirvacy settings and enable two-factor authentication. Most of the social media websites are offering the feature for free.

Update your OS or applications on all devices – usually, the updates take in consideration security updates in priority. Updates and patches help you stay protected even with the latest threats.

Protect your computers, desktops, and laptops with an anti-virus and an anti-malware - the lack of antivirus and anti-malware protection can be compared to leaving an open door at home and closing the windows. Please be minded that an anti-virus will not be sufficient when it comes to protecting yourself from malware, spyware, or rootkits. An example of a combination is Bitdefender as anti-virus and Malwarebytes as an anti-malware.

Read terms and conditions, before registering to the websites. You will be very surprised what it is in there. Some websites might use and transfer your private information to third parties without additional consent.

Be mindful of free applications on smartphones. They might be containing malicious code, or malicious programs, like for example a spyware.

Do not trust free or unbelievably advantageous offers - free offers, free add-ons or e-mails with information about winning important prizes can contain viruses, spyware or other malware that instantly infects your device and can cause unbelievable damage.  Do not click on links from unknown senders, and verify the email address when the email seems from a known source. Spoofing became very common nowadays.   Block people who are suspicious on social media. Fake accounts on all social media platforms are common usage and very numerous. Accounts with recommendations, with connections, and with detailed experiences might be accounts of inexistent professionals and thieves. Be careful when interacting with new online friends, and connections!  

 

Happy Secure new Year 2018, ladies !  

 

Sources:

  • https://community.norton.com/en
  • http://www2.unwomen.org/~/media/headquarters/attachments/sections/library/publications/2015/cyber_violence_gender%20report.pdf
  • http://www.pewinternet.org/2005/12/28/how-women-and-men-use-the-internet
  • http://omegasoft.pl

 




Magda CHELLY
Magda CHELLY

Author

Magda Lilia Chelly, is the Managing Director of Responsible Cyber Pte. by day, and a cyber feminist hacker by night. Magda is the brand ambassador of Peerlyst, one of the strongest InfoSec online communities. She spends most of her time supporting chief information security officers in their cyber security strategy and roadmap. She reviews technical architectures, cloud migrations, and digital transformations. She is continuously raising cyber security awareness & diversity at a global scale. She is currently based in Singapore, with a global reach through her company in 19 locations worldwide. She speaks five languages fluently, and has a PhD in Telecommunication Engineering with a subsequent specialization in cyber security. She also was recently nominated as global leader of the year at the Women in IT Awards 2017, and TOP 50 cyber security influencer globally.


Leave a comment

Comments will be approved before showing up.


Also in Cyber News

The Most Expensive Book About Cyber: Cyber Law in Mexico for $10,514.82

by Magda CHELLY December 06, 2017

I have been reading and looking around for some good stuff about cyber legislation and laws, and I found this amazing book for $10,514.82.

Continue Reading

New Books About Women In Cyber Security

by Magda CHELLY December 04, 2017

 
I have been looking for new books about Women In Cyber Security, and this is what I have found: An amazing list including Jane Frankland's book. Just take a read, is definitely worth it for men and women. 

Continue Reading

Woman In Cyber The 10 Best RFID Blocking Wallets

by Magda CHELLY December 03, 2017

We spent more than 10 hours on research, and editing, to review the top 10 best RFID Blocking Wallets. Being in security, and raising awareness about the topic is definitely giving you also tips on good products that you could purchase to protect yourself and your beloved ones. Credit cards, passports, or driver’s licences have all an embedded radio frequency identification device. This means that cybercriminals or just criminal are able to steal your personal information from the chips. Therefore, a good way to make sure that your data and information is kept private and secured is to use those RFID Blocking wallets.

We are giving you here a list of wallets that we found the most suitable and the most likeable.

Continue Reading