highpowerrouter
  • desktop
  • Tablet
  • monitor
  • router
  • Digital life
  • English
    • English
    • Serbian (Latin)
    • Finnish
    • Czech
    • Bulgarian
    • Japanese
  • Home
  • router
  • Canon Marketing Japan Co., Ltd. ESET SPECIAL SITE Canon MJ Security information Cyber Security Information Bureau ESET Bureau 5 Basic Bureau 5 Basic
17 Nov, 2022

Canon Marketing Japan Co., Ltd. ESET SPECIAL SITE Canon MJ Security information Cyber Security Information Bureau ESET Bureau 5 Basic Bureau 5 Basic

Demand for personal computers increases due to remote work, and dormant PCs are also used.

Demand for personal computers from remote work shifts due to corona evil has increased.On the other hand, there was a situation where personal computers could not be obtained due to the suspension of production lines due to the effects of the corona and the increase in global semiconductor demand.As a result, many users will use a PC that had been dormant at home or company for remote work.

If you use a newly purchased PC or dormant computer for remote work, security measures are often not enough.In fact, cyber attacks have been confirmed on a personal computer with such vulnerabilities.

According to the Cyber Security Report in the first half of 2021, released by Canon Marketing Japan in September 2021, the particularly noticeable cyber attacks related to remote work can be classified into the following two types.

Attacks using adware and fake ads

The top3 domestic malware detected in the first half of 2021 is a malware that is executed on the Web browser, one of which is the "JS/ADWARE" that displays illegal ads..It was "Agent".Inadvertently clicking illegal ads may be guided to fishing sites and other personal information.

Attacks aiming for vulnerabilities of office software

A representative of the attack aiming for office software vulnerabilities is an attack that abuses macros.Although it is an old attack method, it has recently become more sophisticated, and Word macros have been used for the spread of "Emotet", which had been rampant before.In addition, there are more attacks that are difficult to deal with without vulnerability measures, such as "doc/fraud", which is infected just by opening a file.

In addition, there are also attacks aimed at network peripheral devices, such as attacks aimed at vulnerabilities of VPN (Virtual Private Network) and RDP (Remote Desktop Protocol), which are used for remote control to the environment of workplace in remote work.See.If you use a dormant computer, or even a newly purchased computer, if you do not take security measures properly, the risk of such cyber attacks will increase.

新しいパソコンを買った時にやっておきたいセキュリティ対策は?

Five basic security measures when using a personal computer

In order to protect your computer from cyber attacks, it is important to take five basic security measures below.

キヤノンマーケティングジャパン株式会社 ESET SPECIAL SITE キヤノンMJがお届けする安全なデジタル活用のためのセキュリティ情報 サイバーセキュリティ情報局 ESET パソコンのセキュリティで押さえておきたい5つの基本

1) Review of login password settings and Wi-Fi settings

It is not desirable to make a personal computer login password that is easy to guess, such as "123456" or "000000".When setting a password, I want to set a complicated and difficult to be guessed password with an alphabet, numbers, symbols, etc. in 15 digits or more.Recently, the number of PCs that support biometric authentication such as fingerprint authentication and face authentication has increased, and convenience is increasing.However, as in the Pin code of Windows 10, it is also possible to authenticate by entering a password (passcode) in the event of a authentication error.Therefore, the password (passcode) is also strong.

In addition, when using Wi-Fi or wireless LAN, it is also essential to check the security settings of the Wi-Fi router and properly restrict the encryption and connection devices.

セキュリティを高めるために知っておくべきパスワード管理の基本

2) Update to the latest version of OS and software

As with smartphones, the PC should be updated as soon as the update is distributed on the OS or software.As soon as the vulnerability is discovered, it aims for a short time before the update is applied, so the faster the update timing is more effective.

3) Introduction of security software

It is also essential to introduce security software that can achieve comprehensive security measures.For example, ESET Internet security has not limited to malware detection and extermination, but also has a firewall function and phishing fraud, so that it can protect a computer from the threat of various cyber attacks.

4) Understanding OS support deadline

It is also important to know the OS support deadline when reusing a computer that was used in the past and had dormant dormant without using it for a while.Already in Windows 7 and Windows 8, even the OS extension support has ended.The end of the extension support is that even if the vulnerability is discovered, there is basically no update to resolve it.Windows 8.For 1, the mainstream support ended on January 9, 2018, and extension support will end on January 10, 2023.If a highly dangerous vulnerability is discovered, an exceptional update may be made after the end of the extension support, but it should be recognized as an exception.

Keeping the use of a computer with the supported OS is to recognize that the security risk is large, and use a PC that has a continuous version of the OS.

5) Acquisition of regular backup

Backing up regular data is also important.In the unlikely event that it is difficult to get rid of it due to malware, it is possible to initialize the main unit if there is a backup.In addition, even if the data is infected with a ransomware that takes the data as a hostage, the backup can be initialized and the data can be restored from the backup, so that the damage can be minimized.

For Windows 10 or later, Windows Defender offers a variety of security functions as a security center.However, users who are worried about IT literacy and skills will be considered to be considered to use security software that includes support without leaving Defender.

Windows 10のマシンにウイルス対策ソフトは不要か?

Danger in the use of personal computers that can cause security measures

The following risks may occur if you do not take measures described above.

Malware infection

Infection with malware not only has a delay in personal computers and posting suspicious pop -ups, but also data destruction, leakage of personal information and confidential information, and infections on other devices that are connected to the network.Various damage can occur.

Hijacking

If login information is leaked from a PC that has been infected with malware or a user account is hijacked by social hacking, remote control can lead to significant damage.In some cases, a computer with low frequency of use was taken over without knowing it, and was involved in DDOS attacks.

Backdoor installation

The backdoor is an invasion entrance for the attacker to invade the system.A long -awaited method for installing a backdoor is a method of installing a Troy wooden horse in a downloaded program.In some cases, it is caused by human errors, such as forgetting to erase the backdoor created intentionally for application tests.When the backdoor is installed, there are concerns that the attacker will be able to enter freely, leak confidential information and to be a steppiece such as DDOS attacks.

If you neglect security measures, these risks can lead to significant damage, such as writing online payments by information leakage, spoofing, and unauthorized use of online payments.

It is important to increase security awareness

By taking the five security measures introduced earlier, the safety of cyber attacks increases.Both are basic measures, but it is important to be sure to do it because it is basic.

On the other hand, as important as that countermeasures, users who use personal computers are security awareness.Basic security awareness and literacy are important, such as the attachment of emails received from an unknown person, not to open e -mails, SNS and suspicious links for SNS and chat.

Attackers are trying to deceive users in a natural situation in a daily way.

We hope that you have a high security awareness and refer to information sites such as the Cyber Security Information Bureau, and grasp the latest cyber attack methods and examples.

Prev Next
Tags: How to log on to the router

Navigation Lists

  • Demand for personal computers increases due to remote work, and dormant PCs are also used.
  • Five basic security measures when using a personal computer
  • Danger in the use of personal computers that can cause security measures
  • It is important to increase security awareness

Category

  • desktop
  • Tablet
  • monitor
  • router
  • Digital life

Related Articles

  • Buffalo releases 2 models of Wi-Fi 6 router collaboration with anime "Thai Bunny 2"

    Buffalo releases 2 models of Wi-Fi 6 router collaboration with anime "Thai Bunny 2"

    17 Nov, 2022 - By highpowerrouter
  • Learn from Levi's Why you should renovate your aging ERP even if you're late: CIO Dive

    Learn from Levi's Why you should renovate your aging ERP even if you're late: CIO Dive

    17 Nov, 2022 - By highpowerrouter
  • Privacy is a human right. Browser "Tor" that anonymizes the connection source is in a pinch due to lack of servers

    Privacy is a human right. Browser "Tor" that anonymizes the connection source is in a pinch due to lack of servers

    17 Nov, 2022 - By highpowerrouter
  • Compact hotel "First Cabin Kansai Airport" from 6200 yen per night at Aeroplaza directly connected to Kansai Airport

    Compact hotel "First Cabin Kansai Airport" from 6200 yen per night at Aeroplaza directly connected to Kansai Airport

    17 Nov, 2022 - By highpowerrouter
  • Visualize your time and sharpen your actions! "aTime Logger 2"

    Visualize your time and sharpen your actions! "aTime Logger 2"

    17 Nov, 2022 - By highpowerrouter

Hot Articles

  •  Optional patch "KB5010414" is now available for Windows 11. Addresses taskbar enhancements and print / driver issues.Install as needed
    Optional patch "KB5010414" is now available for Windows 11. Addresses taskbar enhancements and print / driver issues.Install as needed
    17 Nov, 2022 - By highpowerrouter
  • A story about mice becoming sticky due to hydrolysis
    A story about mice becoming sticky due to hydrolysis
    17 Nov, 2022 - By highpowerrouter
  • How to Choose a Gaming Monitor
    How to Choose a Gaming Monitor
    17 Nov, 2022 - By highpowerrouter
  • Harnessing Rays: The Revolutionary Rise of Micro Solar Technology
    Harnessing Rays: The Revolutionary Rise of Micro Solar Technology
    17 Nov, 2022 - By highpowerrouter
  • HONOR X8a: How the mid-range smartphone redefines camera technology with its 100MP camera system
    HONOR X8a: How the mid-range smartphone redefines camera technology with its 100MP camera system
    17 Nov, 2022 - By highpowerrouter

Copyright © 2023 highpowerrouter.com. All rights reserved.