• Job Seekers
  • Employers
  • Saved Jobs / Applied Job
  • Login | Register
Our Approach  
Leadership Team About Us Core Value & Culture
Insights Industry Info View All Jobs Contact Us
Saved Jobs Login Register

How To Protect Yourself Against Internet Hacker During MCO?

09 Apr 2020

Internet connectivity has brought lots of convenience towards people. For instance, the video-teleconferencing (VTC) application enables most of the company to carry out their daily activities as usual during the movement control order (MCO) period. Many organizations and individuals are increasingly dependent on VTC platforms, such as Zoom and Microsoft Teams, to stay connected during this period.

Yet also, because of spike internet usage, hackers are causing user’s security breaches by using their computer skills to get user’s information and encrypted data, These hackers are searching loopholes to capitalise on the spike of Internet usage. They tried to act like a real organization, to draw an individual into giving sensitive information such as passwords, banking and credit cards details and personal recognizable data
 


There are several ways to prevent: 

  • Ensure that your VTC and security software was in the latest version 

    • Update the software to its latest version, as the applications was now be enhanced according to security reports as evaluated by security practitioners

    • Only download software from its official website or app store.

  • Pay attention on any suspicious activity on your account

    • Always remember to logout from the application when you finish the meeting. 

  • Never make meetings or public. 

    • Require a meeting password or use the waiting room feature and control the admittance of guests.

    • Do not share or publish the conference ID and URL to any public group or social media.

    • Directly send the link to specific people that you wanted to invite.

  • Do not expose any personal confidential data during meeting

    • Avoid discussing any confidential information to prevent leakage.

    • Enable non-recordable videos and audios, and limit file sharing.


For additional references, the following websites also provide detailed guidelines on Online Video Tele-conferencing:
 

  • https://www.us-cert.gov/ncas/current-activity/2020/04/02/fbi-releases-guidance-defending-against-vtc-hijacking-and-zoom
  • https://www.bleepingcomputer.com/news/software/how-to-secure-your-zoom-meetings-from-zoom-bombing-attacks/
  • https://www.forbes.com/sites/kateoflahertyuk/2020/04/03/use-zoom-here-are-7-essential-steps-you-can-take-to-secure-it/#3757da2a7ae1
  • https://zoom.us/security
  • https://docs.microsoft.com/en-us/microsoftteams/security-compliance-overview
  • https://help.webex.com/en-us/8zi8tq/Cisco-Webex-Best-Practices-for-Secure-Meetings-Hosts
  • https://help.webex.com/en-us/v5rgi1/Cisco-Webex-Best-Practices-for-Secure-Meetings-Site-Administration


In general, we advise all users and administrators of Online Video Tele-conferencing to follow latest security announcements by the vendor and adhere to security policies, according to best practices, to determine applicable updates.
 

Leadership In a Pandemic

Read Article

Pay Cut or Forced to Take Annual Leave During MCO?

Read Article

Talent Houz Recruitment Agency Malaysia

Job Seekers

View All Jobs

Industry Info

Employer

Our Approach

Staffing Solution

Connect with

Copyright © Talent Houz 2022. All Right Reserved.   |  Privacy Policy   |  Terms Of Service   |  Sitemap

Powered by ETC Web Design