When it comes to security, misinformation can be dangerous. You might think that your data is safe based on what you have read on the Internet, heard from colleagues, or simply assumed, but in reality, your data might be at risk. Only when you know the facts can you take the appropriate security measures.
To help you sort fact from fiction, here are the truths behind six common data security myths:
1. Emptying the Trash or Recycle Bin Permanently Deletes Files
Contrary to popular belief, emptying the Trash on Macs or the Recycle Bin on Windows does not delete the files you put there. It only deletes the links to the files and deallocates the space the data took up on the hard drive.
2. Private Browsing Modes Protect Your Privacy
Many browsers have private browsing modes. For example, Google Chrome offers the Incognito mode and Microsoft Edge provides the InPrivate mode. However, these modes are not as private as their names suggest.
3. The Padlock Icon Means a Website Is Safe
Do not be lulled into a false sense of security if you see a padlock icon next to a URL in your web browser. It does not mean that the website is free from malware or the web server will safely store your personal information. The padlock icon simply indicates that any data sent between your computer and the website will be encrypted.
4. Macs Never Get Malware
While cybercriminals tend to launch malware attacks on Windows machines, Macs can also be targets. For example, in July 2016, hackers used Mac malware to steal data. They have even created ransomware that specifically targets Macs. So, if you use a Mac, you still need to take measures to protect your data, such as using anti-malware software and installing Apple’s security updates.
5. All Password-Protected Wi-Fi Networks Are Safe to Use
People and organizations often protect their wireless networks with passwords to keep cybercriminals out. However, a public Wi-Fi network offered by a coffee shop, restaurant, hotel, or other type of establishment might not be safe, even if it is protected with a password. Just like legitimate users, hackers can ask for that password. Once the hackers are on the network, any other mobile devices connected to that network will be exposed. For example, if you are using that network to do some online shopping, your credentials and personal information are at risk of being intercepted by the cybercriminals.
6. It Does Not Matter Which Wireless Encryption Protocol You Use as Long as You Use One
In theory, all wireless encryption protocols scramble your data so that it is unreadable, except by the recipient. In reality, though, they are not all created equal. For this reason, you need to make sure that your wireless device is using the best encryption protocol possible.
Although Wired Equivalent Privacy (WEP) is commonly used, it is outdated and easily hacked, so you should not use it. A much better choice is Wi-Fi Protected Access 2 (WPA2) because it employs the hardest-to-crack encryption algorithm. If your wireless device does not support WPA2, you can use Wi-Fi Protected Access (WPA) instead.
About CHIPS Computer Services
CHIPS Computer Services is an award winning Managed Services Provider specializing in help businesses increase efficiencies and profits by levering properly managed technology. To learn how CHIPS can help your business, email us at email@example.com to schedule no cost business assessment.