3 Common Myths about Internet Security

Understanding internet security is essential when it comes to protecting yourself and your personal information. Unfortunately, there are numerous misconceptions about what keeps us secure online. Let’s examine three common myths about internet security and dispel the misconceptions surrounding them.

Myth #1

Paid or “sponsored” links and content are safe and are vetted by the platform.

The reality is that malicious ads can appear alongside legitimate ones on pretty much any site that has search results or other kinds of advertising on them—even reputable sites like Google, MSN, and Yahoo. This can look like:

  1. Search results toward the top of your search results marked “ad”
  2. Blocks of “sponsored content”
  3. Images or videos, especially when they “interrupt” a web page—for example, an image in the middle of a block of text

Simply clicking or tapping on a malicious ad—or even visiting a site that hosts malicious ads—can lead to trouble. So, before you click…

  • Ask “Could this be a fraudulent ad?”
  • Look at the web address.
  • If there’s a misspelling (e.g. “KyeBank.com” instead of “KeyBank.com”) or an unusual domain (such as “.info” or “.con” for example), don’t click or tap the link.

Myth #2

I’m safe because I stick to “trusted” sources.

The idea that you are safe online simply because you stick to well-known, trusted websites is another popular myth. Just because a website or service is well-known or has a good reputation doesn't necessarily mean it's immune to security breaches or hacking. Even large and well-established companies with significant cybersecurity resources can be vulnerable to cyberattacks that can result in the loss of sensitive customer data.

Cybercriminals are becoming more sophisticated in their tactics, and they can launch fake websites in a matter of moments—then disappear just as quickly. For example, criminals could trick you into visiting a site that appears legitimate, then convince you to enter your personal information, allowing criminals access to financial accounts and significant funds before you notice the money is gone.

It's important to be vigilant and take steps to protect yourself:

 

  • Use strong passwords.
  • Keep your software and devices up to date.
  • Invest in proactive, multilayered security software that blocks threats before they infect your computer.
  • Be wary of emails or messages that ask for personal information or login credentials.

 

By being mindful of these risks and taking proactive steps to protect yourself, you can reduce your risk of being a victim of a cyberattack.

Myth #3

I’ll never be a target because I don’t have any sensitive information on my devices worth protecting.

Cybercriminals don't only target individuals based on the value of the information they possess. Instead, they often target individuals who are likely to be vulnerable to certain types of attacks. For example, a cybercriminal may launch a phishing attack that targets a large number of individuals with the hope that a small percentage of them will fall for the scam.

What’s more, you may not be aware of valuable information that’s vulnerable to an attack. Your email address, phone number, and date of birth, for example, may seem like minor data points on your virtual footprint. The reality is, someone can use this information to steal your identity or launch more targeted attacks.

They can also use this information to build a profile of you and your online habits, which they can then use to craft more convincing phishing emails or to carry out more sophisticated attacks. They might also be able to use your information to attack someone else by sending an email that appears to be from you.

Consider this: Marketers pay big money to be able to use the information you share with social networks. Cybercriminals are no less motivated to use your information for their own financial gain.

Learn more about how we protect client information from fraud and theft at key.com/fraudprevention.