You are in: Articles / Security / Top 6 Security Myths and How to Beat Them

Top 6 Security Myths and How to Beat Them

(Kenneth van Wyk, Computerworld) Should it really be necessary for a consumer to be a security  expert to safely use a computer? We get disgusted that users keep falling for old tricks. But what are we doing to actually help these people?

We should start by better understanding the misconceptions about e-mail and Web site safety that pervade the user base. For example:
  1. If an e-mail looks authentic, it is safe
  2. This e-mail came from someone I know, so I know it's safe
  3. If a friend on Facebook or Twitter posts a link, it's safe
  4. If I merely view a message, without clicking on any attachments or links, I'm safe
  5. If I go to the URL, but don't do anything while I'm there, I'm OK
  6. If my browser displays the locked padlock, then the site is secure
Our systems - from their operating system cores and through the e-mail clients, Web browsers, etc. - need to help our users do things securely.

Read more by following the "full article" link.

Rating: 12345
Leave a comment

Note: all fields marked with (*) are required
Comments (0)
Close send to email window

Verification code

Already a member?
Blacklist monitoring alerts
sign up Signup for our real-time monitoring service and receive email notifications each time one of your IPs gets blacklisted.
Free Signup
Mail Server Operating System Poll

What OS do you use for your email server?
disabled next

How many mailboxes do you currently manage?
previous next

Would you like to comment upon the choosing of this particular OS?

DNS Tools
Get IP status, owner and location, obtain its corresponding hostname or check specific ports.
Ping Statistics
Reverse DNS Lookup
Whois Info (IP owner)
GeoIP Information
Check Port
Open Relay Test
Test if your mail server is an open relay for spammers.
Blacklist Checker
Check if your IP is listed in DNS based email blacklists (DNSBL)