Simple Measures Can Help Middle East Internet Users Protect Themselves from the Growing Threat of Identity Theft
Nicolai Solling, Director of Technology Services at help AG states that the problem is that internet users across the Middle East are eagerly subscribing to online services without paying much attention to the underlying security implications. And cyber criminals are equally eager to cash in on this growing trend. With financial gain being the prime motivation behind such activities, victims of online identity theft stand to suffer substantial monetary losses.
Smartphone adoption is also a key contributor to the growing rate of identity theft incidents. Smartphone penetration in the United Arab Emirates is already at 47 percent and is estimated to cross 70 percent by the end of 2016. Other countries across the Middle East are also expected to see voluminous increase in smartphone sales. Consumers typically use such devices for active engagement in social media and research has shown these users to be at a much higher risk of identity fraud. Banks in the Middle East have also been aggressively promoting smartphone apps for their banking services. The main problem with this is that as a tradeoff for ease of use and quick connectivity, smartphone users tend to be less careful about securing their devices, making them easy targets for cyber criminals.
As the volume and sophistication of malware attacks continues to increase, internet uses in the Middle East need to take proactive measures to protect themselves. Awareness is key to this and here are some useful tips to keep identity thieves at bay!
Lets start with the endpoint
Always use an endpoint (PC) that you trust for doing any transactions that require you to login to identity sensitive services. Unknown machines, such as at internet cafés, could be infected by all kinds of applications which monitor which sites you visit, what keys you enter etc. To be safe, simply wait and use e-banking only when you are at your own PC. Or even better, use an un-rooted or non-jailbroken tablet as malware on these type of platforms are few and still relatively unsophisticated.
Prioritize your password
As obvious as it may seem, the importance of the password cannot be stressed enough. Passwords are the first line of defence and they need to be unique! Quite often people think up a good password and then use it for multiple services and accounts. But you need to keep in mind that each of these accounts will store your password which means that somewhere, someone has access to your sensitive information. And do you really want the administrator of your car-forum or e-mail service to also know the password for your bank account?
How serious is the issue of maintaining unique passwords? Very serious and the recent hacking of the LinkedIn password database is proof of this. In a single attack, hackers managed to steal 6.5 million passwords from the business-networking giant. Although the primary concern for users is to secure the LinkedIn account from misuse, there are more widespread security implication for uses who have reused this password as it now means that their other accounts are at risk as well.
Its also advisable to change your password frequent for critical services. A good password should consist of both characters, numbers and special characters to avoid dictionary attacks.
Most browsers today are vulnerable to cross-site-request-forgery or cross-browser-request-forgery, which means that your authenticated session for an e-banking service could be hijacked by another website which is open in another browser window.
To overcome this, close other browser windows when you log into your sensitive applications! A simple precautionary measure would be to make sure that no other tabs or browser windows are open at the same time.
Think about the network
Many establishments such as cafés, restaurants and hotels often offer free wireless internet. In order to simplify access to such networks, there is no encryption of the data-traffic meaning far less security. Always consider if it is absolutely vital to log on to identity sensitive applications from these networks.
Update and Protect
It should be something we all know, but keeping the security systems on your operating system up to date is very important. Antivirus and security patches should always be up to date in order to avoid infections and attacks.
Furthermore, remember that it is not only the operating system that present risk but also your applications. In fact a high percentage of all malware infections on a PC is related to 5 applications:
- MS Office Suite
- Internet Explorer
So apart from updating operating systems and antiviruses it is extremely important to keep your applications up-to-date.
Kick out malware with a Boot
Many users tends to just hibernate or sleep PCs which means that all disk and memory sensitive areas are stored and re-applied when the machine is started again. This is of course convenient, but recent types of malware are only present in the memory and do not require any files to be written. This means that when a machine is booted the malware is also removed. Therefore, before you do any sensitive work on your PC it could be a good idea to boot it.
When everything else fails, apply common sense
Although the threat landscape today is immense and there are many different infection vectors the biggest issue is still user behaviour. The adage, 'prevention is better than cure' holds particularly true in this regard.
Think about which websites you use, which software you install and who wrote it. If you are constantly installing untrustworthy software or even software that is pirated, you are exposing yourself to risks. Never execute files from any unknown source, and remember that almost all files are executable, including films, music, documents, PDFs- the list is long. So the next time a friend gives you the latest blockbuster movie it is not only a copyright issue, but also additional risk that you are exposing yourself to.
While statistics offer a grim warning, they are all to often ignored. Internet users seem to adopt the 'that will never be me' mentality until the worst has occurred. Being smart and even a bit overly cautious is a far better alternative to months of even years of unnecessary trouble. Protecting your online identity starts with you- and its time to take charge!
About help AG
help AG is a strategic information security consulting company, founded in Germany in 1995 and has been present in the Middle East since 2004. help AG provides leading enterprise businesses across the region with strategic consultancy combined with tailored information security solutions and services that address their diverse requirements enabling them to evolve securely with a competitive edge.
Each and every vendor solution help AG presents to a Client has been thoroughly researched and evaluated. help AG is constantly identifying new and innovative solutions to offer to the market through its own in-house research & development laboratory. For more information, please visit www.helpag.com.
Villa 41, 81-d Street, Uptown Mirdif
P.O. Box 78835, Dubai
United Arab Emirates
This release was published on openPR.
Permanent link to this press release:
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.
You can edit or delete your press release Simple Measures Can Help Middle East Internet Users Protect Themselves from the Growing Threat of Identity Theft here
News-ID: 228848 • Views: 6796
More Releases from help AG
Help AG to Conduct Live-Hacking at GISEC to Highlight Top Middle East Cyber Secu …
DUBAI, United Arab Emirates- 08 March, 2016: Help AG, a leading information security services and solutions provider in the Middle East, today announced its participation at GISEC, taking place at the Dubai World Trade Center (DWTC) from 29 to 31 March 2016. The security specialist has clearly marked three focus areas for its participation – to highlight its extensive portfolio of services, including its Managed Security Services (MSS); demonstrate its
Help AG Announces Participation at GISEC 2015 Together with 6 Vendor Partners
DUBAI, United Arab Emirates- 19 April 2015: Help AG, a leading information security services and solutions provider in the Middle East, has announced its participation at GISEC 2015, taking place in Dubai from the 26th to the 28th of April 2015, where it will be present together with six of its vendor partners. In addition to demonstrating each of these vendors' technologies, the company will focus on showcasing its own
Help AG Launches Managed Security Services in the Middle East
Dubai, United Arab Emirates - 22 March, 2015 - To enable government and large enterprise businesses in the Middle East to combat the threat of cyber-attack, achieve IT compliance, and drastically reduce incident resolution time, without the significant overhead of a dedicated IT security department, Help AG, the leading information security services and solutions provider in the Middle East, has established its new Managed Security Services (MSS) division. The company
Help AG Announces Reseller Agreement with Splunk
DUBAI, United Arab Emirates, 11 December, 2014: Help AG, a leading information security services and solutions provider in the Middle East, has announced the signing of a reseller agreement with Splunk Inc., provider of the leading software platform for real-time Operational Intelligence, that will enable it to offer Splunk® software, including Splunk Enterprise, to businesses in the Qatar, Saudi Arabia and UAE region. As per the agreement, Help AG will
More Releases for Middle
Middle East Railway Sector Middle East Railway Sales Report
For Report Sample Contact: firstname.lastname@example.org or +91-11-47067990 Report Table of Contents Middle East Outlook 1.1 Countries Overview 1.2 Middle East Economy 1.3 Transportation in Middle East Middle East Rail Transport Outlook 2.1 Overall Status of Rail Transport in Middle East 2.2 Trends in Railway Infrastructure Development in Middle East Saudi Arabia 3.1 Existing Railway Infrastructure 3.2 Proposed/Planned Railway Infrastructure 3.3 Regulatory Framework 3.4
Middle Ear Implants Market
Middle Ear Implants Market Overview Middle implant ear is a small device inserted into the middle ear and coupled to ossicles. Middle ear implants are devices designed for those who suffer mild- moderate mix or sensorineural hearing loss and conductive hearing loss. Middle ear implant is an advanced technology for the conventional use of hearing aid. A middle ear implant is recommended for people suffering from earmould allergies, skin problems, ear
Strong impulses in Middle-East
at-visions ONEvision Hotel TV solution is set to make big impact in Middle East. at-visions ONEvision Hotel TV solution is set to make big impact in Middle East. Parallel to establishing a strategic partnership with Omnix, the leading AV system integrator in Middle East, at-visions presented its approach of Hotel TV to qualified prospective buyers. "We were able to discuss our solution in detail with experienced senior-level management representatives from quite
Middle Classes Dominate Brazilian Investments
The changing face of the Brazilian middle class brings new challenges to domestic and foreign investment in Brazil. Once content with cheap promotions, the middle class is now more discerning and looking for quality. This search for better products affects consumer goods across the board. From laptops to real estate, Brazilian middle class (known as Class C) is going for quality over price. Until now, they were content with cheap offers,
Investment in Brazil's Middle Classes
After eight years under Lula, Brazil now has a new president. Like her predecessor, newly-elected President Dilma has pledged to continue investment in Brazil’s new middle classes. Under this investment, Brazil has experienced spectacular economic and social growth. A glance at statistics in key areas since 2002 shows impressive increases in both Brazilian wealth and social status. Although there is still plenty to do to fulfil Dilma’s pledge to end
Middle Managers Business Software Perception
The purpose of "inlevel 2011 Report: Middle Management as Business Software Influencer's" based on survey conducted between American middle managers was to check their approach to business software. Do they have influence on software they use? What they need? Do business software vendors pay enough attention to them? Middle managers are not typical decision makers within enterprise. However, 42% of them actively act during enterprise software selection process. They want to