Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.


Check here if you're human


Top 10 Security Considerations For New Device

Pin It

There’s a ton of new devices flooding the market and it has been predicted by the North Pole there have been many good boys and girls this year who will be receiving them. Out of Santa’s sack will come computers, tablets, smartphones, and gaming consoles. But if you happen to get one of these new devices, you should know that the first step in enjoying it is protecting it.

Smartphone or tablet:

Mobile malware is on the rise, and Android is still the most targeted platform.

1. Threats aimed at mobile phones are growing.

o Malicious applications are a main threat area, so be careful of the third-party applications you install— they could end up infecting your phone or sharing your personal information. Only download applications from a reputable app store, and read other users’ reviews. Also, make sure you are aware of what kind of information the app wants to access before you download it.

o Consider mobile malware threat protection to safeguard your device against viruses.

o Apply system or application updates which almost always include security patches and make your devices easier to use.

o Turn off antennas you don’t need. If you’re not using any one of the four typical wireless connections (cellular, Wi-Fi, Bluetooth, and GPS) on your smartphone or tablets then turn them off. It will help keep you safe and give you the best battery life.

o Don’t store personal information, such as passwords and account numbers, on your phone.

o For more information on McAfee® Mobile Security solutions, please visit:  www.mcafee.com/mobilesecurity.

Apple iPad, iPhone or iPod touch: Apple computers and devices has led to escalated threats. Mac malware has risen throughout 2012, and according to McAfee Labs, this trend looks to continue.

2. Transfer your PC best practices to your new Apple computer or device.

o As a proactive measure, consider installing security software that’s been developed for the Mac since more threats are being aimed at this platform.

o Don’t leave your device unattended, allowing a thief to grab it and your sensitive information.

PC or netbook:

3. Make sure your computer has comprehensive security software.

o Your security software should include at a minimum: anti-virus with cloud computing, a two-way firewall, anti-spyware, anti-phishing and safe search capabilities.

o Additional levels of protection include anti-spam, parental controls, wireless network protection, and anti-theft protection that encrypts sensitive financial documents.

o Don’t just use anti-virus software—this alone is not enough.

4. Keep in mind that free software can leave you unprotected.

o Free security software typically provides only basic protection, and is often offered to get you to buy more comprehensive software. Look for security software that provides up-to-date protection using cloud computing which can help protect against emerging threats.

o Don’t forget to check whether the security software installed on your new PC is only a trial version. If it is, remember to buy a subscription so that you have continuous protection against newly discovered threats.

5. Have data protection in addition to comprehensive security.

o In a recent global survey, home Internet users estimated that their digital assets, such as photos, contacts, and entertainment, were worth approximately $37,000, yet more than a third lacked protection across their devices.Consider a product that offers data backup and restore features as well as advanced security in case of a loss.

o Don’t take a chance on losing important personal photos, creative works in progress, or financial information.

6. Search and shop safely.

o You should know that McAfee Labs counted 43.4 million suspect websites during the third quarter of 2012, up 20% over the previous quarter, and these pose a threat to your computer and your devices.

o To help you weed through malicious sites, be sure to use a website safety advisor that can tell you which sites are safe and which are risky. McAfee SiteAdvisor™ is included in all of the McAfee consumer security suites.

o When shopping, look for theMcAfee SECURE™ trustmark, which indicates that the site has passed rigorous daily testing for 10,000 known hacker vulnerabilities.

7. Be aware of “scareware” and “ransomware”

o Scareware tricks users into believing that the computer may be infected to get them to “buy” fake antivirus software and hand over their personal and financial details, usually via pop-ups.

o Ransomware also appears through pop-ups, and typically accuses Web surfers of visiting illegal webpages. These pop-ups claim to be from the police and threaten to lock up the user’s computer system until they pay a fine.

o Ransomware grew by 43% in the third quarter of this year, while scareware continues to thrive, and is estimated to victimize 1 million people a day.

o Don’t buy antivirus software through pop-up ads. Always purchase your security software from a reputable vendor, and keep it up-to-date to avoid ransomware scams.

8. Educate your family and pay attention to your children’s online activities.

o Keep your computer in a common area and discuss which information is appropriate to share online and which is not, such as addresses, phone numbers, and other private information.

o If you have kids or tweens, limit their online access and the content they can view. Use aWeb filtering tool that protects kids from accessing inappropriate content such as pornography, nudity, online hate groups, school cheating sites, and profanity.

o Don’t assume your child doesn’t know how to turn off parental controls.

oFor more information on keeping your kids safe, visit McAfee’s Family Internet Safety Center at www.mcafee.com/family and check out the 10-Step

Internet Safety Plan For Your Family.

Gaming or entertainment device, such as a Nintendo Wii or 3DS, PlayStation 3, and Xbox 360:

9. Keep in mind that these gaming and entertainment devices are now Internet-connected and vulnerable to many of the same threats as PCs.

o Make reliable backup copies of games to protect your investment.

o Take advantage of built-in parental controls that can help shield kids from violent games or limit when the device can be used.

o Some multiplayer games allow kids to play with strangers over the Internet, so if you are a parent consider activity-monitoring tools.

o Only connect your device to a secure Wi-Fi network.

o Don’t store personal information on yourdevice.

Removable storage device, such as a flash drive or portable hard drive:

10. Use technologies that will help protect your information.

o Consider using a secure, encrypted USB stick, to scramble your information so it is unreadable if your device is lost or stolen.

o Buy security software to protect your portable hard drive, and set a password.

o Don’t leave your removable storage device unattended since they are small and easily stolen.

Of course, many of us have multiple devices. To make protecting them easier, consider using a product such as McAfee All Access, which provides the first complete security protection for PCs, Macs and mobile devices in one cost-effective, single solution. To learn more, go to www.mcafee.com/allaccess.

Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!  (Disclosures)

About the Author
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.

Similar Posts

  • What is Ransomware?
    Imagine that you want to pull up a certain file on your computer. You click on the file and suddenly a notice flashes on your screen saying your computer has been compromised and in order to get your files back, you need to pay up some money. This, ladies and gentlemen, is ransomware, a nasty
  • No Surprise—Ransomware On the Rise
    McAfee’s latest Threats Report shows a 1.5 million increase in malware since last quarter. 2012 is in fact, far and away the busiest year ever for malware with an estimated total of 100 million malware samples worldwide by Q3 2012. With the malware growth rate up nearly 100,000 per day, McAfee has identified these key variations
  • 4 Tactics Cybercriminals Are Using to Steal From Us
    Today McAfee Labs™ released the McAfee Threats Report: Second Quarter 2013, which reported that the cybercriminal community is using four main tactics to steal our identities, and our money. As consumers, it’s critical that we are aware of the ways the hackers are trying to attack us and here’s the four main ways: 1. Malicious apps on
  • McAfees 10 Tips To Secure New Devices and Guard Against Cybercrime in 2011
    Here are some practical tips from McAfee to ensure optimal Internet safety and security in 2011: Be aware that threats aimed at mobile phones are growing – Use software that backs up smart devices and use strong discretion when storing, saving or editing personal information on your smartphone or device. Don’t keep all
  • Internet Security Isn’t Getting Any Prettier
    Malicious software (malware) is, in many ways, very well understood. Security experts know how it works and why. Cybercriminals’ motivations are pretty straightforward—making money from malware and related attacks. In the latest McAfee Threats Report: Q3 2012 , malware is still growing and while it’s not growing quite as fast as it was in previous quarters, the amount

Leave a Comment

You must be logged in to post a comment.

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in
Browse by Month

Browse by Category