Many cybersquatters simply register web domains in order to sell them to established businesses or brand owners at a later stage – this practice is often referred to as domain parking.  However, some cybersquatters have more malicious intentions. By registering a website address that looks as though it belongs to a well-known business or organization, cybercriminals may be able to lure unsuspecting visitors onto the site. Often, these websites will contain malware.


  • Type the URL or use bookmarks you have saved – and make sure it’s accurate
    When you wish to visit a specific website; it’s safer to type the URL into the address bar on your web browser or use a saved bookmark or favorite – instead of clicking on a link.  Having typed the URL, you should carefully check that it is correct – before you click the enter key on your keyboard.  Any spelling errors could result in you being directed to a cybersquatter’s website – and that site may contain malicious software.


  • Don’t open suspicious emails – or click links or open attachments within them
    If you receive any suspicious looking emails – especially emails that claim to be from or associated with social media sites – it might be wise to avoid opening them and resist the temptation to click on any links within them.  Instead, you should visit the site that the message claims to be from – so you can directly access any notifications or messages contained on the site.


  • Eliminate vulnerabilities in your OS and applications
    Ensure that your operating system (OS) and all applications running on your computer – including browsers and plugins – are regularly updated.  This will help to eliminate vulnerabilities that could be exploited by malware if you visit a cybersquatter’s website.  Patches are deployed from a centralized platform to all Company Windows workstations and servers on a monthly basis.  A common misconception is that Microsoft products are the most vulnerable software packages out there when it fact it is third party vendors such as Adobe, Mozilla and Java top the list.


  • Install Internet security software – and keep it updated
    An effective antivirus solution – that includes a firewall – can help to protect your computer, by blocking malicious subdomains.  Some security software will also warn you about risks if it believes that you are about to enter a potentially malicious domain.  At home, your Internet Service Provider (ISP) may offer you security software as part of your monthly subscription; please contact them to obtain details on how to download and install it.  To help maximize your protection, make sure your security software is regularly updated.  The Company has a layered security model to help minimize the risk of malicious activity occurring within the network.  The layered security model includes, but is not limited to, network intrusion detection systems, endpoint protection on workstations, firewall appliances as well as a web filtering technology to block and protect against known malicious Internet sites.


Related Information:

Vulnerabilities in Microsoft and non-Microsoft applications in the 50 most popular applications Endpoint Protection Test Results

Order by: 
Per page:
  • There are no comments yet
0 votes
29.09.2015 (29.09.2015)
0 Subscribers