Posted on Nov 9, 2015
What is the best possible strategy to fight against cybercrime?
3.99K
16
10
1
1
0
Posted 10 y ago
Responses: 7
How about we mail them an EMP care package? It would take em' so far back that they would have to rub sticks together to make fire!
(2)
(0)
I would say as some and that the only true way is to minimize the risk is by knowledge and practice. Social media is here to stay and credit cards/debit cards are all over. So everything most people do or use is tracked in some way. If you read, listen and make yourself aware of the things going on around you, you can atleast have the knowledge of what to say or do in certain situations and on the technology you use. Your smartphone, computer, and the social media you use. Situational awareness has become more than just, " watch your 6."
(1)
(0)
I saw this and my first thought, like many here, was to say cut all ties to the Internet. However, just keep an eye on who delivers your pizza or enters your house. One thumb drive is all it takes to own your data regardless of your connectivity...
(1)
(0)
Cyber-crime evolves with the technology being used. There is no way to truly end it, but continuous research and development gives cyber criminals a harder time.
(1)
(0)
Perhaps the best way is also the most disruptive, counter-productive method. Stay off the grid and offline, period. Or if required to go online, keep personal information, personally identifiable information, and sensitive data (financial or medical records being prime) off any system that you use to connect online as well as off any sites.
Regardless of outside connectivity, you should have proper protections in place to include secure configurations of your computers utilities like the build in firewall in windows, turning off bluetooth, turning of wireless if not needed, setting up windows defender. Third party application and utilities are also useful to either augment, replace build in utilities, or add utility functions to the system. You should have a modicum of protection suites, at the very least, to safeguard you against malware, phishing, web tracking, script blocking, and such.
Even if you visit sites that you know and trust, a key thing to remember is never trust 100% online, no matter the source. There are documented cases in which a highly trusted site was either hacked and unintentionally exposed users to malicious activities or an ad (or other third party service) was introduced which infected visitors. Remember, you don't have to click something to have it activate malware, simply loading a image file can have repercussions.
With cyber, perhaps the best weapon to use is knowledge. Ignorance is definitely not bliss when dealing with security and information systems. Arm yourself with awareness, basic do's and don'ts of the cyberworld, how to recognize problems, best practices for personal and professional use, etc.
Regardless of outside connectivity, you should have proper protections in place to include secure configurations of your computers utilities like the build in firewall in windows, turning off bluetooth, turning of wireless if not needed, setting up windows defender. Third party application and utilities are also useful to either augment, replace build in utilities, or add utility functions to the system. You should have a modicum of protection suites, at the very least, to safeguard you against malware, phishing, web tracking, script blocking, and such.
Even if you visit sites that you know and trust, a key thing to remember is never trust 100% online, no matter the source. There are documented cases in which a highly trusted site was either hacked and unintentionally exposed users to malicious activities or an ad (or other third party service) was introduced which infected visitors. Remember, you don't have to click something to have it activate malware, simply loading a image file can have repercussions.
With cyber, perhaps the best weapon to use is knowledge. Ignorance is definitely not bliss when dealing with security and information systems. Arm yourself with awareness, basic do's and don'ts of the cyberworld, how to recognize problems, best practices for personal and professional use, etc.
(1)
(0)
Robust antivirus protection, a stout firewall, and know the websites you were going to go.
(1)
(0)
MSG John Wirts
The problem with anti-virus and security firewalls are that programs are devised to circumvent them as fast as new programs are developed. Security programs are either lax enough to allow usage and inadequate for cyber protection. or so secure that they are unusable. Making sure that the result of cyber attack is immedate retalation, and total destruction of the cyber attack equipment, and site.
(0)
(0)
SSgt Alex Robinson
MSG John Wirts - A hardware fire wall such as a sonicwall along with proper AV software will go a long way in protecting you.
(0)
(0)
MSG John Wirts
Yes, but I remember the TI 16k memory computer, and the Commodore 64 k computers. These had no cyber connection, and no viruses, once the different computers got connected on the internet the HACKERS arrived. The kids today are far more dangerous then some of the more innovative programmers of yesterday. If you put strong enough security on the system, NO ONE can use it. If you put strong security in place the legitimate users and the innovative hackers will get in. The only way to stop hackers is to one isolate the system from the internet totally, or two impose severe consequences for hacking. Isolation from society and the internet for domestic hackers. Destroy cyber warfare sites in foreign countries, and blockade trade with rest of the world until they dismantle their cyber warfare sites and programs. Until and unless these consequences are certain trhere will be no secure way to remain connected to the internet.
(0)
(0)
Read This Next

Cybersecurity
