4 Common Computer Security Myths

We’ve all heard them, those little snippets of information that you heard from a friend who got it from a friend of a friend of a friend. Let us separate a little fact from fiction once and for all.

Cyber Security Expert Witness: Hacker Image on Computer

#1 Antivirus and Security companies create viruses

Huh? Really? Legitimate companies DO NOT create viruses to infect your computer to get you to buy their product. Those that do this are known as “ransomware” and are in fact viruses in their own right. Legitimate companies such as Norton, Avast, and Panda, will not create a virus or infect your computer. There are plenty of real threats in the world that these companies have to deal with.

#2 The Internet is the biggest security threat

Not quite. While this statement is not wrong, the internet is a threat, who uses the internet? That’s right, we all do. The vast majority (well over 70%) of security breaches in 2013 were caused by… Human error! This is not to say that we do this on purpose, in reality, we don’t, but we make mistakes. We go to those websites and click on those links that our security professionals tell us not to, bringing the security network around us crashing down. You are part of the solution. If it seems too good to be true, it probably is. If you receive an email from someone that you don’t know, don’t click on the link. If you receive an odd email from someone that you do know, you may want to contact them before clicking on any links in the email.

#3 Apple is safer than Microsoft

Somewhat true, we can see why people would think this. The simple answer is no, Apple is no safer than Microsoft. “But why do we see all the viruses attacking Windows machines?” you might ask. Good question. Microsoft Windows represents about 80% of the computer market, hackers know this and basically use a shotgun approach to hacking by focusing on Windows. So no, the apple O Sis not immune to viruses. In fact, in 2012 the Flashback Trojan affected over 600,000 Macs, making them inoperable. In 2013, Apple users were hit with a Java attack that came from a corrupted file on the iPhone. And this year, the Shellshock/Bash vulnerability is said to have compromised the files of over 1,000,000 users. Don’t think that just because you have an Apple, that you are safe.

#4 Hackers only Target Big Businesses

Again, not true. These stories find their way into the news only because it involves a large number of people. But there are new cases every day of a small company or a single person getting hacked. Just because you are a smaller target, does not mean you are not a target. You have personal information stored on your computer that can be used for identity theft and fraud. It is not unusual for there to be a higher amount of small business or individual hacking incidents than big business, again, it’s just market share. Protect yourself. If you have a small company use a skilled, legitimate information systems partner. Regularly get an outsider’s point of view. IT professionals can tend to believe that if they set it up and it is running then all is ok. An outsider’s point of view can help your IT insider see what they are missing.

Digital Forensic Experts

Digital Forensics

Digital Forensics

Digital Evidence