Cyber security Tips - #cyberaware
Protect Your Sensitive Personal Identifiable Information (PII)
Personal Identifiable Information (PII) is any information that can be used by a cybercriminal to identify or locate an individual. PII includes information such as name, address, phone numbers, date of birth, Social Security Number, IP address, location details, or any other physical or digital identity data.
Defend against hackers with 2‑Step Verification and Multi-Factor Authentication
Two-factor or multi-factor authentication is a service that adds additional layers of security to the standard password method of online identification. Without two-factor authentication, you would normally enter a username and password. But, with two-factor, you would be prompted to enter one additional authentication method such as a Personal Identification Code, another password, or even a fingerprint
Avoid visiting unknown websites or downloading software from untrusted sources. These sites often host malware that will automatically install (often silently) and compromise your computer.
If attachments or links in the email are unexpected or suspicious for any reason, don't click on them.
Keep software up-to-date
Installing software updates for your operating system and programs is critical. Always install the latest security updates for your devices:
Turn on Automatic Updates for your operating system.
Use web browsers such as Chrome or Firefox that receive frequent, automatic security updates.
Browse with web safely
Be careful about using public or free Wi-Fi, even if it requires a password, These network may not be encrypted. so when you connect to a public network, anyone in the vicinity may be able to monitor your internet activity such as the website that you visit and the information you enter.
Avoid online scams and phishing attempts
Double-check files before downloading, Always Validate suspicious URLs or links, and Beware of E-mail scams and other types of messages
A few important cyber security tips to remember about phishing schemes include:
Bottom line – Don’t open an e-mail from people you don’t know
Know which links are safe and which are not – hover over a link to discover where it directs to
Be suspicious of the emails sent to you in general – look and see where they came from
Malicious links can come from friends who have been infected too. So, be extra careful
Top New Threats in Mobile Security
1. Persistent Mobile Spyware
2. Outdated Apps
3. Mobile Botnets
4. Ad and click Fraud
Comments
Post a Comment