Norton UK Blog
With the festive season now behind us, it’s time to enjoy that internet connected gadget you may have treated yourself to or received as a gift. As exciting as these new devices are, it’s easy to get caught up in the fun of using it without considering how you will be using it in a few months. Now is the right time to make yourself aware of the ways that you’ll need to protect your new device and the information you store on it. Just remember—if it connects to the Internet, it is vulnerable.
From laptops to smart watches, to connecting safely online, here’s our ultimate guide on how to setup and protect your new tech.
Internet of Things gadgets aren’t just for toys for techies. They are actually more accessible by cost and ease of use, and people are finding convenience in creating a “smart home” with connected things.
However, convenience does not come without risk. One of the key security concerns with smart homes is ensuring that devices are not vulnerable to hacking and cyber attack. So how do you create a smart home while following cyber safety best practices to keep it secure?
Malware is created by hackers and is often distributed over the internet. While many people are considerate of malware as a threat to their desktop computer or laptop, they tend to be more lax when it comes to their tablets and smartphones – which means mobile devices are ripe for the picking when it comes to identity theft, stolen personal information, emptied bank accounts, and viruses meant to break the device in question.
What types of mobile malware exist?
Safer Internet Day is fast approaching and on February 7th online users are being encouraged to unite to make the online world a safer place with this year’s theme being “Be the change, unite for a better internet”.
Have you considered how you can keep your family's personal information safe in the digital world?
Falling for an email scam is something that unfortunately can happen to anyone. It’s a frightening concept, and one that frequently results in undiluted panic. Also known as a phishing scam, an email scam involves using email and fraudulent websites to steal sensitive information such as passwords, credit card numbers, account data, addresses, and more.
Picture the scenario: your poor nan has already been scammed once before. She received an email from a long-lost aunt in Honolulu who offered her the chance of an emotional reunion. She clicked the link or wrote back and began a chain of communication that resulted in the loss of a small fortune.
There’s a new kind of crime in town and it’s starting to make itself known. You may have heard about it in the news, read about it online or worse still, you could have already been a victim. Its name is Ransomware and you certainly don’t want to be inviting it around to your house for high tea.
- blog (4)
- digital trends (34)
- family security (28)
- gaming and entertainment (10)
- how to guides (29)
- internet of things (9)
- mac tips (2)
- mobile insights (13)
- mobile safety (26)
- online safety (63)
- online safety tips (34)
- online security (72)
- online security tips (35)
- online threats (50)
- optimise your device (14)
- parental control software (7)
- social media (14)