Everyday Cybersecurity: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
 
(4 intermediate revisions by the same user not shown)
Line 3: Line 3:
{| class="wikitable" style="border: none; background-color: transparent; text-align: center; width: 100%;"
{| class="wikitable" style="border: none; background-color: transparent; text-align: center; width: 100%;"
|-
|-
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Use Strong and Unique Passwords<br>[[File:password-lock.svg|frameless|100px|link=[[#Use Strong and Unique Passwords]]]]</div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Use Strong and Unique Passwords<br>[[File:password-lock.svg|frameless|50px|link=[[#Use Strong and Unique Passwords]]]]</div>


| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Enable 2FA<br>[[File:2fa.svg|frameless|100px|link=[[#Enable Two-Factor Authentication (2FA)]]]]</div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Enable 2FA<br>[[File:2fa.svg|frameless|50px|link=[[#Enable Two-Factor Authentication (2FA)]]]]</div>


| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Be Cautious with Personal Information<br>[[File:personal-information.svg|frameless|100px|link=[[#Be Cautious with Personal Information]]]]</div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Be Cautious with Personal Information<br>[[File:personal-information.svg|frameless|50px|link=[[#Be Cautious with Personal Information]]]]</div>


| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Additional Tips<br>[[File:help-outline.svg|frameless|100px|link=[[#Additional tips for online safety]]]]</div>
| style="vertical-align: middle; border: none; background-color: #EBEBEB; text-align: center; width: 25%;" | <div style="font-weight:bold;">Additional Tips<br>[[File:help-outline.svg|frameless|50px|link=[[#Additional tips for online safety]]]]</div>
|}
|}
=Use Strong and Unique Passwords=
=Use Strong and Unique Passwords=
Line 38: Line 38:
#Regularly review the privacy settings of your social media accounts and limit the amount of personal information that is publicly visible.
#Regularly review the privacy settings of your social media accounts and limit the amount of personal information that is publicly visible.


=[[Additional tips for online safety]]=
{{#categorytree:Email & Other Communications|mode=collapsed}}
{{#categorytree:Sensitive Data|mode=collapsed}}
{{#categorytree:Encryption|mode=collapsed}}
{{#categorytree:Phishing|mode=collapsed}}
 
=Additional tips for online safety=


#Keep your software and devices up-to-date with the latest security patches.
#Keep your software and devices up-to-date with the latest security patches.
Line 46: Line 51:
#Consider using reputable Virtual Private Network (VPN) software to keep prying eyes from monitoring your online activities.
#Consider using reputable Virtual Private Network (VPN) software to keep prying eyes from monitoring your online activities.
#Be wary of browser extensions or plugins; only use them when provided by reputable organizations; and consider isolating them to a specific browser profile to limit what a malicious browser extension can access.
#Be wary of browser extensions or plugins; only use them when provided by reputable organizations; and consider isolating them to a specific browser profile to limit what a malicious browser extension can access.
{{#categorytree:Anti-virus & Anti-malware Software|mode=collapsed}}
{{#categorytree:Risks & Threats|mode=collapsed}}
{{#categorytree:VPN|mode=collapsed}}
{{#categorytree:Phishing|mode=collapsed}}
[[Category:Prevention]]
[[Category:Prevention]]

Latest revision as of 18:09, 30 October 2023

In an increasingly digital world where our lives are intertwined with technology, securing your online activities is paramount. Cyberattacks, data breaches, and online threats are ever-present, potentially compromising our personal information, financial security, and business operations. This page offers you an overview of baseline security measures along with further resources. From safeguarding personal devices and online accounts to being vigilant against phishing attempts and keeping software up to date, these measures are essential for protecting our digital identities and ensuring a secure online experience.

Use Strong and Unique Passwords
Password-lock.svg
Enable 2FA
2fa.svg
Be Cautious with Personal Information
Personal-information.svg
Additional Tips
Help-outline.svg

Use Strong and Unique Passwords

  1. Create strong, complex passwords that include a combination of letters (both uppercase and lowercase), numbers, and special characters.
  2. Avoid using easily guessable information like personal names, birthdays, or common words.
  3. Use a different password for each online account to prevent a single breach from compromising multiple accounts.
  4. Consider using a reputable password manager to generate, store, and autofill complex passwords securely.

Enable Two-Factor Authentication (2FA)

  1. Whenever possible, enable 2FA for your online accounts. This adds an extra layer of security by requiring you to provide a second authentication factor, such as a one-time code sent to your mobile device or email, in addition to your password.
  2. Use app-based 2FA methods (e.g., Google or Microsoft Authenticator) rather than SMS-based methods.
  3. SMS-based 2FA can be vulnerable to SIM swapping attacks that can be very challenging to recover from.
  4. For your most sensitive accounts (payment services, financial institutions, medical providers, healthcare insurance, etc.), consider using biometric authentication devices.
  5. For less sensitive, but important accounts (utilities, telephone services, cable or internet services, etc.) that do not support 2FA, consider asking your service provider to set a security word, a security question & answer, or a passphrase that isn't easy for others to guess.

Be Cautious with Personal Information

  1. Be mindful of the information you share online, especially on social media.
  2. Avoid posting sensitive personal details such as your full address, phone number, or financial information.
  3. Be skeptical of unsolicited emails, messages, or requests for personal information.
  4. Phishing attacks often use social engineering to trick users into revealing sensitive data.
  5. Regularly review the privacy settings of your social media accounts and limit the amount of personal information that is publicly visible.
no subcategories
no subcategories

Additional tips for online safety

  1. Keep your software and devices up-to-date with the latest security patches.
  2. Use reputable antivirus and anti-malware software.
  3. Be cautious when downloading files or clicking on links from unknown sources.
  4. Educate yourself about common online threats and scams to better recognize and avoid them.
  5. Consider using reputable Virtual Private Network (VPN) software to keep prying eyes from monitoring your online activities.
  6. Be wary of browser extensions or plugins; only use them when provided by reputable organizations; and consider isolating them to a specific browser profile to limit what a malicious browser extension can access.
no subcategories
no subcategories