ProSec GmbH

+49 261 45093090

  • About us
  • Services
    • Detection services
      • Classic penetration testing
      • Pentest as a service
      • Web application pentest
      • Vulnerability analysis
      • Red teaming
    • Solution services
      • IT security consulting
      • Data protection
        • GDPR
    • Education services
      • User awareness
      • Trainings
        • Junior penetration tester
        • Penetration tester web
        • Penetration tester network
  • Wiki
  • Jobs
  • Contact

How can you protect yourself on the Internet?

How to protect yourself from Internet?

Protection on the Internet

In the meantime, surfing the Internet has established itself as an everyday activity. Regardless of whether you are looking for information or simply want to be entertained – the Internet offers an endless variety of possibilities.

Unfortunately, many dangers are associated with the use of the Internet and require special caution. In the following, we would like to draw your attention to possible dangers and risks and explain how you can protect yourself on the Internet.

Protect yourself form phishing mail

Phishing

In phishing, the attacker primarily tries to obtain a user’s sensitive data. The main goal includes looting an account or taking over the identity. A phishing attack mainly starts with an email, which is customized by the attacker. As a result, the victim is lured to a fraudulent website where personal data is grabbed. Spear phishing, on the other hand, is a threat to a specific organization or person. The attacker disguises himself as an employee, friend, or even business partner.

To protect yourself against such threats, you should never click on the links in a dubious mail. Furthermore, you should always check the address bar in your browser and never open the attachments of a suspicious email.

Protect yourself form troyans

Trojan

A Trojan is a computer program that performs completely different functions or pursues completely different motives in the background. For example, the user is manipulated by a social engineering trick into downloading a program that is loaded with malware. A widespread Trojan is called a crypto Trojan (ransomware). Here, the intruder gains access to the system in order to encrypt sensitive data afterward and demand a ransom to get this data back.

In order to protect oneself on the Internet and to counteract these dangers, one should be careful where the software is downloaded from since on many platforms it is no longer possible to guarantee a check that is tailored to each software.

E-mail attachments should never be opened in doubt of the unique sender.

Protect your company's IT against the dangers of the Internet!

We find the weak points in your system!

Contact us
Protect yourself from DDOS Attack

How you can protect yourself on the Internet in the event of a denial of service?

In a DoS attack, a service is deliberately overloaded with requests, as a result of which the system can no longer handle the essential tasks and, in the worst case, collapse. Such attacks can be traced back to vulnerabilities in programs and operating systems. Often, the attackers control multiple machines, creating a so-called botnet. The botnet contains a network with several infected computers, which are interconnected via the Internet and administered by the so-called “botmaster”.

An appropriate response is crucial to counteract such attacks and to protect against them on the Internet. The system should be regularly checked for security vulnerabilities in order to take preventive action against them.

Protect yourself Malware

Malware

Malware is a harmful computer program. The malicious functions run in the background and are not visible to the user. The main damage that occurs would be, among other things, that files are deleted or manipulated.

Security software, such as antivirus scanners, can help by quarantining or blocking malicious software. One disadvantage would be that virus scanners mainly perform signature-based detections, which means that only known malware can be detected. Regular updating of these software solutions is mandatory – it does not replace an IDS/IPS solution or network segmentation.

How to protect yourself on the Internet:

Protect yourself with passwords

Passwords

Passwords should be chosen carefully and meet certain quality requirements to ensure that they serve their purpose. Cybercriminals have tools that automatically try out all possible combinations of characters (brute force attack) to obtain access data.

A password should consist of letters, numbers, and special characters and have a length of at least 16 characters. Password managers help the user to manage different passwords well and to promote the associated corporate policies in the context of “secure password”.

Calling a web page

A website should always be secured by TLS, which is indicated by the identifier HTTPS in the URL. This standard technology is mainly used to secure connections on the Internet and to protect sensitive data that is disclosed on a website. The padlock in the browser bar provides an overview of the issuing certification authority.

Bild des stellvertretenden Geschäftsführers Immanuel Bär

You would like to get comprehensive information about protection options?

Please feel free to call us or write us via our contact form!

Inquire now

Conclusion on the subject: "How can you protect yourself on the Internet?"

It is well known that the human factor plays the most important role in staying safe on the Internet. Employees should be regularly educated on the topic of IT security through user awareness campaigns in order to create a basis for counteracting such threats in the future. Any technology is only as good as the person using it, which is why training measures on phishing etc. are indispensable.

Zuletzt aktualisiert am May 26, 2021

OUR LOCATIONS

  • Headquarters:
  • ProSec GmbH
  • Robert-Koch-Straße 1-9,
    D-56751 Polch, Germany

  • Berlin office:
  • ProSec GmbH
  • Friedrichstr. 123,
    D-10117 Berlin, Germany

 

  • Munich office:
  • ProSec GmbH
  • Franz-Joseph-Str. 11,
    D-80801 München, Germany

TOP-SERVICES

  • Penetration testing

  • Vulnerability analysis

  • Trainings

  • IT security consulting

  • Social engineering

All rights reserved. © 2022 ProSec GmbH | Imprint | Privacy policy | Sitemap