How to be an info-loser

1 April 2013 Information Security

Fred Mitchell
Fred Mitchell

The need to protect valuable business and personal data from hackers, viruses and theft is something that all users are aware of, as cybercrime has become a multi-million dollar industry. However, there are many other ways to lose your data, which people often do not even think about.

These simple, everyday mistakes could end up compromising machines, exposing users to identity theft and allowing sensitive information to fall into the wrong hands. To protect yourself, your business and your information, avoid doing these 10 things that will practically guarantee that you lose your data in 2013.

1. Claim your winnings or log onto Internet banking via e-mail

Cybercriminals and attackers often hide malware in links in either e-mails or text messages. Clicking on these links can install malicious software which compromises your computer and gives hackers access to all of your data. These e-mails are often very convincing, so it pays to be aware.

The answer? Do not click on links in e-mails from people you do not know or trust. If it seems suspicious, rather ignore it. This may seem obvious, yet cybercriminals continue to use this method because of its high success rate. Remember, your bank will never e-mail you and ask you to click on a link to log into online banking via e-mail. And if you did not enter the competition, or you do not remember entering it, you have not won – things that seem too good to be true generally are.

2. Advertise your absence

Standard business practice dictates that when you are away from your desk for any length of time, you should put up an auto responder. However, we often provide far too much information in these e-mails, such as where we are, how long we will be gone for, who to contact and so on. This gives cybercriminals enough information to launch attacks that can seem very convincing and genuine.

The best way to avoid this is to limit the information contained in auto-responders, to give cybercriminals less ammunition to work with.

3. Procrastinate your backup

Backups are time consuming, but putting off your backup until tomorrow or the next day could have devastating consequences, especially for small to medium businesses (SMBs). Symantec estimates that during a typical data outage, SMBs can lose 52% productivity and 29% revenue. This can cripple a business, particularly if this data cannot be timeously recovered.

Ensure that backup is completed at least once a day, if not more, using an automated backup solution. Identify critical resources, ensure that they are included in backup policies, and importantly, test your backup and restore capabilities frequently to ensure that they are working correctly before a disaster strikes.

4. Accept friend requests from people you do not know

Social media has changed the way we interact with each other, and many people feel that there is no such thing as too many friends on Facebook. However, making friends with people you do not know can be a dangerous practice. Cybercriminals use social media to spread viruses, perpetrate fraud, distribute spam and phishing messages, and even gather information that can be used for identity theft.

Many SMBs do not have policies in place to regulate social media usage, so it is even more important for individuals to be aware. As a rule of thumb, do not make friends or ‘connect’ with people you do not know. Social media provides high levels of anonymity, and the person you just made friends with may not be who they say they are.

5. Plug in the memory stick you just found lying around

Memory sticks and flash drives are a convenient way of carrying data around, and are highly portable, so are often left lying around. But picking up that USB storage device and plugging it into your computer could be the worst decision you ever made.

The drives are convenient for data, so they are also highly convenient for spreading viruses and other malware, and they are often used for just this purpose. Rather spend a few hundred Rand and buy your own brand new flash drive, instead of taking a chance on the one you found lying around.

6. Take confidential data home with you

In this age of the mobile workforce, many employees copy confidential data onto unencrypted USB drives, send this information to their personal e-mail addresses or upload them to file sharing sites, in order to allow them to work from home. Many people also remove information in these manners without permission, which leaves the organisation open to vulnerabilities and data loss or theft.

If confidential data is needed for mobile working, make sure it is encrypted before it leaves the office, to prevent it from falling into the wrong hands. This way, even if laptops and flash drives get stolen or misplaced, data remains protected.

7. Send confidential data over free Wi-Fi

Wi-Fi hotspots are a free, convenient and ever more accessible way of accessing the Internet in public places. However, it needs to be remembered that these hotspots are free to access, which means that they are not encrypted and are typically not secured. Sending confidential information over these channels leaves it open to theft and access by unwanted eyes.

If you are going to use an unknown network, it is advisable to use a secured https connection or a Wi-Fi privacy application, which will ensure that your connection over public Wi-Fi is secured, helping to protect data.

8. Do not use the screen lock on your tablet, it is inconvenient

Mobile devices enable productivity anywhere, and tablet PCs and smartphones have revolutionised the concept of always-on, always connected and always productive. However, the very portable nature of these devices means that they are easy to lose and are often stolen or misplaced. If a device is lost or stolen, it is highly likely that an attempt will be made to breach corporate networks or data.

The easiest way to stop casual, opportunistic attacks is to use a simple, built-in feature that is included on every single smartphone and tablet – the screen lock function. Make sure you use this with a strong password or a ‘draw to unlock’ pattern.

9. Download mobile apps indiscriminately

Mobile apps can help to increase productivity, and can be used for simple entertainment too. However, the simple fact is that cybercriminals follow their audience, and mobile malware has increased dramatically in recent years. The easiest way for attackers to spread this malware is to embed it in an innocent-seeming mobile app, which you as the user then download and install.

The solution is to only download apps from legitimate vendors on authorised app marketplaces. Always read the fine print to avoid installing apps that require excessive permissions, such as uploading all of your contacts. These are likely to be malware, which will send out spam and phishing messages and can compromise your device,

10. Using weak passwords and the same password for multiple sites

Passwords are surprisingly easy to crack, as most users will choose an easy to remember password about something that is close to them, like a pet’s name. Many people also re-use the same password on multiple sites and write their passwords down.

Make sure your password is strong by using at least eight characters and a combination of letters, numbers and symbols. Most importantly, do not leave your passwords on a sticky note next to your desk.

Avoiding these 10 simple mistakes can go a long way towards protecting data. However, it is also important to incorporate security best practices into SMB organisations to protect business information. A written security policy is always an advisable first step, and should include aspects such as identification of critical data, strong password policies and a disaster recovery plan. Other areas to look at include encryption of confidential information, development and enforcement of Internet security guidelines, training on security threats, and using a reliable security solution that is kept up to date.

Cybercrime continues to thrive, but SMBs are not helpless to protect themselves from harm. Following best practice guidelines and enforcing simple policies to avoid the most common pitfalls will protect you from all but the most persistent attacks, and can help to save your business from security threats and their resultant consequences.

For more information contact Drive Control Corporation, +27 (0)11 201 8927, fredm@drivecon





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
African industries may overestimate cyber defences
Information Security
A significant perception gap exists in security awareness training: 68% of leaders believe training is tailored to roles, yet only a third of employees feel adequately trained. Many organisations only conduct annual or biannual generic training that may not effectively change behaviour.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.