|
1. Think twice before clicking on links or opening attachments
|
|
|
Even if an email appears to be from someone you know, be wary of attachments. Be aware of the way the email is written, the logos it contains, if it is addressed as being from a company, as well as the sender's email address. Do not reply to the email because the sender's identity may have been compromised.
|
|
|
|
|
2. Check private information requests
|
|
|
Whenever you are asked to provide private information (yours or anyone else's), verify the identity of the requester, even if it appears to be from someone you know. Cyber criminals are dedicated to creating creative and underhand ways to trick victims into collecting information to steal and harm victims.
|
|
|
|
|
3. Protect your passwords
|
|
|
Never reveal your passwords to anyone. Make them long, strong, unique and use multi-factor authentication (MFA) wherever possible.
- Use a password manager.
- Use different passwords for different accounts.
- Use different passwords for work and home.
- Don't allow apps and websites to save your passwords.
|
|
|
|
|
|
|
When in public places be vigilant. Do not leave your devices with access to personal and/or work information unattended. When accessing sensitive information confirm that there is no possibility of direct access or viewing of device screens. When at work, secure your area and lock your computer screen before leaving your desk. Take your mobile phone and other portable items with you.
|
|
|
|
|
5. Keep devices, browsers and applications up to date
|
|
|
At home, automate software updates and periodically reboot your devices to ensure updates are fully installed. Be aware of requests for updates from your employer's IT team and comply as soon as possible.
|
|
|
|
|
6. Back up critical files
|
|
|
Store backups in a location physically separate from the originals and test them periodically. For critical work files, use storage options approved by your employer. For personal files, save a backup to a separate drive (for example, cloud or encrypted USB) for safe storage.
|
|
|
|
|
7. Delete confidential information when it is no longer required
|
|
|
Confirm with your employer what are the procedures for the storage and destruction of critical documents. At home, review what information you have stored and whether it is still valid or should be deleted.
|
|
|
|
|
8. If you are suspicious, report it!
|
|
|
Learn how to recognise suspicious fraud and other suspicious activity. At work, check procedures and act immediately. At home, report any emails you receive to the relevant authorities and judicial authorities. Also inform your family and friends!
|
|
|
|