Online Security Mistakes Seniors Make

Improved Essays
Ten Online Security Mistakes Seniors Make

Seniors, in general, are trusting souls and don’t understand the dangers online. There are so many cyber thieves online searching and lurking, waiting for their next trusting victim to make a mistake. Each day at least 1 million cyber-attacks are executed, and the number is growing. It’s our job to keep our seniors informed and protected from all dangers, including the internet.
Here are 10 tips on how to explain to seniors they are vulnerable to cyber thieves.
1. Seniors generally think they don’t have any information the cyber thieves are interested in and don’t pay that much attention to the much-needed extra security precautions.
To change their mind, sit down with them and ask them these
…show more content…
Seniors happily click on links, download attachments and give away their personal information to anyone that offers them a chance to win some prize.
Explain to them to second guess any email they receive before opening it, replying or clicking on any link or attachment. Explain to them not to click on any links from their bank or any other organization. They should log in directly to the website and get the information directly.
5. They don’t know how to set up their privacy settings on social networks.
Privacy settings are imperative to set up correctly on social networks. Show them how to set up their privacy settings and explain if they leave their privacy settings to public, anyone can see everything that is posted on their account, leaving them wide open to cyber thieves.
6. They share too much information on Social Media.
Seniors love to post photos of their family, their homes, photos from their vacations, etc. They aren’t aware that the internet can be dangerous if proper precautions aren’t taken. It is full of terrorists along with groups where pedophiles are sharing photos trying to locate children that are easy
…show more content…
Seniors don’t understand they need more than just an Anti-virus software to protect their devices.
Anti-virus software alone isn’t enough to keep technology devices safe from all the dangers lurking on the web. They also need a good Malware software and internet security software to protect their information.
10. They don’t understand how easy malware and cyber-attacks can infect their computers.
Seniors don’t understand how sophisticated and frequent cyber-attacks happen. They don’t realize how easy it is to get malware. All it takes is clicking on an infected banner on a legit website, and they can get infected.
Let them know that even legit websites can be compromised. They don’t need to click or download anything for their PC to get infected with malware or Trojans. Malicious codes injected in ads will search for vulnerabilities in their system and exploit them.

Keeping ourselves and our Seniors safe online should always be a number one priority.

Karen

Related Documents

  • Improved Essays

    Threat Assessment of ‘Important Security Alert From Windows’ Pop-Ups: ‘Important Security Alert From Windows’ Pop-Ups has created havoc among computer users that does not allow them to usually work in the computer. Where this adware has found its own method to attack the targeted system and to make the infected computer almost useless. In order to trouble computer user, it performs several malicious activities to use the security gaps in the system and it leads to freeze the entire running programs of the computer. Firstly, this malware program affect the processing speed of the infected computer to stop the basic functions of the system so that the computer will respond very slowly when user give any instructions.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    First and foremost, a parent’s number one goal is to be one hundred percent sure that their kids are secure and blissful. Therefore, if spyware ever becomes necessary to fulfill this desire, then it must occur because it is the parent’s duty to be aware of their children’s habits. Coben explains that using spyware is a “scary, but a good idea” (1) as he considers spyware as a system to help parents monitor their kids and be assured of their safety. At first, parents may suppose that using the software is deceiving and that it should never even be considered. But, if they start to ponder on it, then they will understand its importance and effectiveness.…

    • 1272 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Hackers/Crooks have put hard working people in hardship by ruining their credit causing them to be unable to buy a home or even getting hired on at a job. They have been known to steal credit card numbers from websites, breaking into homes or digging into the trash to retrieve personal information, and an employee you work with that takes a look at your personal file(Federal Trade, National and State, Consumer Sentinel, 2013).Though the internet is one of the main ways identities are stolen, they will pick-pocket you, steal your mail right out of the box, your tax information, and even obtaining medical services(Cassim, 2015).…

    • 105 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    For numerous people logging onto the Internet is as routine as putting on a pair of clean underwear everyday. People take it for granted without realizing what is actually going on. Everytime you log on to the world wide web, you are risking your computer to numerous viruses, spyware, and adware programs. Many people dont realize that over ninety percent of computers today are infected with some form of virus or spyware. It is usually to late for people to do anything by the time they realize they have been infected by some malicious computer disease.…

    • 522 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Privacy Policy Case Study

    • 476 Words
    • 2 Pages

    Lauren Hixenbaugh, MSBA 5400, Privacy Policy Human Resources- Role Internet Usage - Any information accessed on the internet while using company property or during company time will be kept confidential. Unless required by law to surrender or if said information is deemed inappropriate or criminal.…

    • 476 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Many senior citizens have taken to the Internet and Email. This opens up the possibility to be scammed. This can occur by clicking on a link not knowing the true threat behind it, or by providing personal information on a website that is not safe. Email scams are also known as phishing scams. In 2003, 22% of the elderly population used the Internet.…

    • 679 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Small Security Breach

    • 556 Words
    • 3 Pages

    The divulgence of a small business’s secrets is one of the worst things imaginable. Unfortunately, data security breaches are happening more often. “But I have a small business,” you’re thinking. “No one would take the time to hack into my systems and steal my information.”…

    • 556 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Privacy Internet Safe

    • 180 Words
    • 1 Pages

    The internet is not as safe of a place as it is perceived. Our concept of privacy as well as the frequent usability of technology in society may be capable of situating our privacy and personal information in danger. We rely on the Internet for virtually everything we do and are careless to the type of information we place there. Personal information such as our address, account numbers, and even social security number are necessary for our everyday use of the internet such as email, online banking and shopping. Where does the entirety of that information go that we provide to these websites?…

    • 180 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Imagine the idea of signing a legal document that allows a thief to rob you. This sounds preposterous; however, this is reality for elderly who are affected by financial abuse. “In 2010 alone, reported instances of scams and fraud against older adults resulted in losses of about $2.9 billion” (Siddiqi). The amount of theft has only risen over the last six years, and is expected to keep growing if no further prevention or education is put into place. More and more people are living to older ages than what the world has ever seen.…

    • 1686 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    The internet’s expansion since its first communication between two computers back in 1969 has created many new opportunities for people across the globe. Modern day life relies on the usage of the internet, where it improves the lives of people by making it easier to communicate, speed up their work, and share with others. However, with great things comes great consequences. Although the internet helps expand people’s lives and experiences, how are they to protect such precious treasures? Back in 1989 Robert Morris created one of the first computer worms to spread; which in turn caused much of the internet to shut down.…

    • 2112 Words
    • 9 Pages
    Improved Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays
  • Superior Essays

    Assignment #2 The reason why normal people tend to expose themselves to the malware risk is mostly due to their lack of knowledge or carelessness. For example, in the text it states that “many people ignore the content of the want to trust this applet?” and merely click trust. The problem is that unsuspecting people are not fully reading what these dialog boxes say and they will simply “allow any signed applet to run on their machine.”…

    • 1126 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    The first step is to get educated on ways to protect yourself against hacking, phishing, etc. Step two is to understand the common tactics hackers use and step three is to secure your computers and digital assets. You can follow these steps in order to make sure that you stay safe from the criminals lurking around the internet. I hope after reading this paper you will take some steps to try and make your computer at home the safest you can and that you will be extra careful with putting your personal information out…

    • 1245 Words
    • 5 Pages
    Superior Essays