Vous êtes sur la page 1sur 6

BE SAFE ON THE

INTERNET

April, 2019
wide variety of attacks – everything from opportunists trying to
WHAT ARE INTERNET THREATS AND HOW
extract passwords through phishing [emails which purport to be
from legitimate sources and attempt to get us to click on an
infected link] to highly organized crime units targeting
TO BE SAFE AGAINST THEM?
businesses and government systems in an effort to steal
intellectual property and information related to critical
infrastructure.
1. NEVER CLICK ON A LINK YOU DID NOT EXPECT TO RECEIVE
The golden rule. The main way criminals infect PCs with malware is by luring users to click on a link or open an attachment.

"Sometimes phishing emails contain obvious spelling mistakes and poor grammar and are easy to spot,"
“Targeted attacks and well-executed mass mailings can be almost indistinguishable [from genuine emails]."

Social media has helped criminals profile individuals, allowing them to be much more easily targeted, he adds. "They can see what
you're interested in or what you [post] about and send you crafted messages, inviting you to click on something. DON'T.

BEWARE OF PUBLIC WIFI IF IN DOUBT, BLOCK THINK BEFORE YOU TWEET AND HOW IGNORE POPUPS
YOU SHARE INFORMATION

Most Wi-Fi hotspots do not Just say no to social media Principal risk is ID fraud. "If Pop-ups can contain
encrypt information and once a invitations (such as you aren't willing to stand at malicious software which
piece of data leaves your device Facebook-friend or the Market square and say it, can trick a user into
headed for a web destination, it LinkedIn connection don't put it on social media." verifying something. "[But
is "in the clear" as it transfers requests) from people you if and when you do], a
through the wireless network. don't know. It's the cyber download will be

DOS AND DON’TS OF ONLINE SAFETY


"That means any 'packet sniffer' equivalent of inviting the performed in the
[a program which can intercept twitchy guy who looks at background, which will
data] or malicious individual who you at the bus stop into install malware,"
is sitting in a public destination your home.
with a piece of software that
searches for data being
transferred on a Wi-Fi network USE ANTI-VIRUS SOFTWARE
can intercept your unencrypted
data.
2. USE DIFFERENT PASSWORDS ON DIFFERENT SITES/ NEVER REUSE YOUR MAIN EMAIL PASSWORD

over half of adults (55%) use the same passwords for most, if not all, websites they visit.
while one in four (26%) use birthdays or names as passwords.

Use one phrase say eng1neer


Now for every site you log on to, add the first and last letter of that site to the start and end of the phrase, so the password for Amazon
would be "Aeng1neern". At first glance, unguessable. But for you, still memorable.“

A hacker who has cracked your main email password has the keys to your [virtual] kingdom. Passwords from the other sites you visit can
be reset via your main email account. A criminal can trawl through your emails and find a treasure trove of personal data: from banking to
passport details, including your date of birth, all of which enables ID fraud.

3. ENABLE 2 STEP VERIFICATION

If your email or cloud service offers it – Gmail, Dropbox, Apple and Facebook do – take the trouble to set this up. In addition to

DOS AND DON’TS OF ONLINE SAFETY


entering your password, you are also asked to enter a verification code sent via SMS to your phone. In the case of Gmail you only
have to enter a fresh code every 30 days or when you log on from a different computer or device. So a hacker might crack your
password, but without the unique and temporary verification code should not be able to access your account.

4. LOCK YOUR PHONE AND TABLET DEVICES

Keep them locked, just as you would your front door. Keying in a password or code 40-plus times a day might seem like a
hassle but "It's your first line of defence." Next-generation devices, however, are set to employ fingerprint scanning
technology as additional security.
1. DON’T ASSUME BANKS WILL PAY YOU BACK

Banks must refund a customer if he or she has been the


victim of fraud, unless they can prove that the customer
has acted "fraudulently" or been "grossly negligent". In
any case of fraud, the matter is always determined on an
individual basis. "However, were they to fall victim to the
same fraud in the future, after their bank had educated
them about how to stay safe, it is possible a subsequent
refund won't be so straightforward.

2. MACS ARE AS VULNERABLE AS PCs

Your shiny new MacBook Air can be attacked too. It's true
COMPLACENCY CAN BE DANGEROUS
that Macs used to be less of a target, simply because
criminals used to go after the largest number of users – i.e
Windows – but this is changing. Determined hackers
attackers are still able to find new ways to exploit users on
almost any platform.
QUESTIONS?

Vous aimerez peut-être aussi