Click Networks - IT Support Glasgow

Click Networks - IT Support Glasgow
Click Networks - IT Support Glasgow

Friday, 19 April 2013

Internet Security: Fact and Myth

Myth #1: Viruses and other malicious software (“malware”) only affect computers and laptops.
Reality: Mobile malware, which affects smartphones, tablets and other mobile devices, increased by 58% last year. This malware can steal information such as phone numbers and email addresses (32% of the time), or use the phone’s GPS to track the user (19% of the time).

Myth #2: I can’t get a virus or be attacked on popular social networking sites.
Reality: Many well-known social networks, including several of the newest ones, are prime targets for scammers, with 56 per cent of social media attacks involving fake gift cards and survey scams.

Myth #3: Apple products aren’t susceptible to viruses and online attacks.
Reality: While hackers still primarily target PCs, more than 600,000 Mac computers were infected by one attack   last April; just one example that no operating system is safe from online threats.

Myth #4: Free antivirus software on my computer provides complete protection.
Reality: “Ransomware” (where cybercriminals lock you out of your computer unless you pay their “ransom”), is one example of the trend toward increasingly vicious malware, which is known for being harder to undo, more aggressive and more professional than other malware. This malware requires protection beyond what basic, free antivirus software can offer.

Myth #5: It’s easy to tell if a site is fake -- typos or foreign characters are dead giveaways.
Reality: Many spoofed sites today look exactly like the websites of legitimate brands, down to the smallest details. Additionally, the number of fake sites that imitated social networks more than doubled in 2012.

Myth #6: My computer won’t get infected since I don’t visit risky sites.
Reality: 61% of malicious sites are actually legitimate websites that have been compromised and infected with malicious code. Business, technology and shopping websites were among the top five types of sites hosting infections.

Myth #7: I’ll know right away if my computer is infected.
Reality: Cybercriminals today rely on stealth – the longer they’re on your machine undetected, the more damage they can do. Your computer could even be part of a “botnet” – a network of remotely-controlled computers that send spam emails or participate in widespread attacks – and you might not even know it.

Luckily there are still a few things you can do if you're guilty of falling for some (or indeed all) of these Internet security myths. We recommend:
  • Stick to trusted websites when possible. When purchasing items online, check for security marks on the site before entering in your payment details.
  • Limit your sensitive transactions when using public Wi-Fi networks or use a Virtual Private Network (“VPN”). Wi-Fi networks can allow other people to more easily snoop on your activity.
Common-sense should also dictate the following:
  • Use complex and unique passwords for each site, including upper and lowercase letters, numbers and symbols.
  • Never click on links or open attachments from people you don’t know. Also, if you receive a strange message from a friend, take a moment to verify it – it’s possible their email or social networking account was hacked.
 Read the full article here: 

For more information on anything you have read here or any IT Support queries please contact us on 0141 530 9116 or email us at To learn more about us please visit our website:


  1. Excellent article. Too many don't understand the importance of a good strategy for security issues within IT in their business.

  2. Awesome! By the way, the reason for IT support is to minimize downtime and find your business back up-and-running as quickly as possible. Click here for more details.

  3. Been using AVG protection for many years, and I recommend this Antivirus to everyone.

  4. BlueHost is one of the best hosting provider with plans for all of your hosting needs.