As cyberattacks听rise,听remote workers听advised to invest in security

Those who work-from-home no longer have the advantage of a corporate network鈥檚 security perimeter, and can thus be more vulnerable to malicious actors on the Internet, according to internet security firm Kaspersky.听Among the ways to minimize falling prey to such cyberattacks are being knowledgeable about cyberthreats and beefing up one鈥檚 security software.听听听
While devices have built-in anti-virus software, these aren鈥檛 capable of detecting听threats such as听malicious URLs (Uniform Resource Locators or web addresses), said Bric Adam Tenorio, pre-sales manager for the Philippines at Kaspersky, a security technology company. A malicious URL is either a website created by threat actors, or a legitimate website which has been compromised with malicious content.听听
鈥淚 encourage everyone, especially those who work-from-home using their own devices, to invest in security software, to give them peace of mind [when accessing work files],鈥澨齭aid Mr. Tenorio.听听
Rosemarie Gonzales-Roy, Kaspersky鈥檚 corporate communication manager for Southeast Asia, added:听鈥淲e have to be smart about our online habits. If you can avoid it, don鈥檛 use your work devices for personal use.听鈥 Turn off your camera and microphone when you鈥檙e not using them. Also, even if your employers don鈥檛 say so, use a VPN.鈥 听听
A听virtual private network (VPN), a service that听provides online privacy and anonymity by creating a private network from a public internet connection.听听听
SOCIAL ENGINEERING
The听panelists听also warned against social engineering, which involves deceiving users to act unknowingly against their best interests. The most popular type is phishing, which is when individuals are contacted by e-mail or phone by someone posing as a legitimate institution to lure these individuals into providing sensitive data such as credit card details or passwords.听听
Telltale signs to look out for are company logos that resemble official ones, domains that are different from the supposed senders (e.g., a Bank of America e-mail with听[email protected]听as the return address), and non-personalized salutations (i.e., Dear Sir/Madam).听听听
鈥淭he operative word is deceiving,鈥 Mr. Tenorio said.听听
Mr. Tenorio listed questions that can help individuals spot a social engineering attack:听听
- Are my emotions heightened? Am I being frightened to take action? Am I being encouraged to update my personal data because of my account was supposedly compromised?听听
- Did the message come from a legitimate sender? Does the website I鈥檓 on have odd details? Does the offer sound too good to be true? Did my friend actually send this message to me?听听听
- Is the attachment or link suspicious? Does the URL start with 鈥渉ttp鈥 instead of the secure 鈥渉ttps鈥?听听
- Can this person prove their identity?听听
OPEN WIFI
Because working from home can also mean working from anywhere, individuals should be wary of threats such as man-in-the-middle attacks (MITM). MITM happens when a cybercriminal gains access to an unsecure听Wi-Fi router听鈥听such as in public wi-fi听connections听in cafes and malls听鈥听and uses this as a way to deploy tools to read a victim鈥檚 transmitted data. These tools can also be inserted between a victim鈥檚 computer and the website the victim visits to capture personal information such as log-in credentials.听听
When logging in at websites, Mr. Tenorio advised utilizing one-time passwords (or OTPs) for an added layer of authentication.听听听
鈥淥TP is one of my favorite security inventions,鈥 Mr. Tenorio said. 鈥淧lease don鈥檛 provide your OTP, even if [the ones asking for it] say they鈥檙e customer support.鈥澨鈥斕Patricia B. Mirasol听
SIDEBAR听|听How to avoid credit card听fraud听听
With pandemic-related restrictions听boosting听e-commerce,听cardholders run the risk of sharing sensitive information if听they aren鈥檛 careful when online shopping. There was a 30% increase in fraud cases last year compared to the previous year, according to听the听Credit Card Association of the Philippines (CCAP), which acts as a mediator for the credit card industry, merchant establishments, and consumers.听听
Bangko听Sentral听ng Pilipinas (BSP) also reported in a briefing last month that out of 20,000 consumer concerns received in 2020, 13% were related to fraudulent, unauthorized transactions involving deposits, online services, remittances, and, of course, credit cards.听听
Because there are so many different types of credit card fraud that online consumers need to watch out for, CCAP outlined the common forms of each and how to defend against them.听听
Phishing and vishing听听
These scams come in the form of e-mails, fake job sites and browser toolbars, banner ads, and text or chat messages. Vishing is a subcategory within听phishing that involves phone calls from scammers pretending to be bank representatives. The play here is to lure victims into giving sensitive data by offering fake promos or assistance to help with their account that has been hacked.听听
What to do: Don鈥檛 click any links and examine the e-mail or message first. When in doubt, contact the bank to verify if the message is valid or to ask if a caller claiming to be a bank representative is legitimate. The best thing to do is ignore them and keep all sensitive information to yourself while nothing is verified.听听
Lost or stolen cards听听
Whether it鈥檚 because a wallet went missing or a card was mysteriously misplaced, anyone with access to credit cards could make unauthorized transactions.听听听
What to do: Report the lost or stolen card to the bank immediately so they can block the account. To prevent future losses, cardholders should refrain from placing the wallet in areas visible to many people. Cards could also be placed in a separate pouch, so that losing a wallet wouldn鈥檛 mean losing all cash, cards, and IDs.听听
Card replacement scam听听
Scammers may call people claiming that their credit card is due for replacement or even an upgrade. Instead of doing what they promised, they can use the card for their own purchases and never give it back.听听
What to do: Be careful with calls or messages that claim to be about your credit card or bank account. Banks usually ask cardholders to go to a branch to get a replacement card and let you do whatever you want with the old card.听听
Skimming听听
The word comes from the device that fraudsters install on an automated teller machine (ATM), as it can skim a card鈥檚 magnetic stripe that contains the cardholder鈥檚 information.听 Even the credit card terminal at a cashier where one shops can be tampered to skim cards.听听听
What to do:听While听banks have upgraded their cards鈥 microchips to听EuroPay, MasterCard, and Visa (EMV) technology that makes it harder for skimming devices to get information,听cardholders should remain vigilant by staying alert when transactions are being made, checking ATMs for devices, and shaking scanners before inserting the card.听听
It鈥檚 risky to conduct a credit card transaction while using a free, public internet connection as it鈥檚 difficult to determine if these have been hacked by fraudsters, CCAP said in听a听press release.听听听
Though banks now have mobile apps where cardholders can track transactions, lock cards when not in use, or receive notifications on the latest scamming trends, constant contact with the bank is still important since banks can reach out for any suspicious or unusual account activities.听鈥斕B. H. Lacsamana听


