Cyber Security for Halloween

Oct 30, 2015

Tags: , , ;

zombie hand with phone

Halloween is for both children and adults. Children get to dress up as some of their favorite characters and go around the neighborhood trick-or-treating for candy. Adults enjoy going to haunted houses and parties with friends.

During the Halloween season, cybersecurity is not at the forefront of most people’s minds. Snapping pictures and instantly sharing them on Facebook for everyone to see is very common. While these pictures may be treats for other people to see, they can also be treats for criminals.

Sharing pictures of a decorated house is fun, but it can also be a source of great information for criminals. Some identity thieves may take the address along with your name and steal your identity. Burglars also now have an address for you, so when you post about your family being out at a Halloween party, it opens a window of opportunity for them. When posting photos of your home, make sure you keep out any details that would make it easily identifiable.

Many companies have come out with apps specifically for Halloween. These apps can range from spooky games for children to Halloween shopping apps . When downloading apps, make sure that the app is from a reputable source. Some cybercriminals will use apps to upload viruses onto your device or to steal information from you.

Certain apps can be beneficial for trick-or-treaters and their parents. Some parents may want to consider uploading an app that will track trick-or-treaters as they wander around the neighborhood. This way, parents can know exactly where their children are at any given time. Other apps that parents may want to consider are flashlight apps or apps that can lockdown a device should you or your children lose their device.

Be safe this Halloween but have some fun. Share photos of your kids dressed up with family and trusted friends. Enjoy the thrills of going into a haunted house. Have fun with your kids as they go around trick-or-treating.

Happy Halloween!

** The information used in this article is from the McAfee blog