What is Cyber Security?
Cyber Security means protecting your systems, networks, and programs from digital attacks which are aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
In the good old days, crooks had to do it in person but in the digital age, you get or may not even get a message " You have been hacked"
Common Cyber Threats:
Email Account Takeover: A cybercriminal hacks an email account and searches for emails involving correspondence between the client and their financial institutions. They learn about your habits so they can pose as you to your loved ones to steal money.
Malware, Virus, Ransom: Malicious software is created to damage/disable computers and computer systems, steal data, or gain unauthorized access to networks.
Phishing: Cybercriminals pretend to be trustworthy sources to acquire sensitive personal information such as usernames, passwords, social security numbers, and credit card details.
Identity Theft: Most people re-use passwords and usernames (aka ‘credentials’). Cybercriminals get hold of these logins, try them with financial institutions' websites to find matches, and then request fraudulent fund transfers.
Spoofing: Masking the source of a communication (phone or email) to look like a reputable source (e.g. government, call within a company, etc.).
Call Forwarding: The cybercriminal forwards all calls to our home and/or cell phone number to their phone.
Hacking: Someone enters your network and steals all the important information by using the right credentials.
Security is everyone’s responsibility. Your Role and Responsibility is to:
Safeguard email accounts
Limit what youshare online
Protect our clients’ assets
Be strategic with usernames and passwords
Here are five ways to adopt Cybersecurity in this digital age:
1. Ensure you have physical control of your devices at all times and nobody is hacking into them
2. Use extra caution when using public Wi-Fi at the airports or stations
3. Use good email encryption client
4. Do not insert any unknown USBs in your laptops, computers
5. Report any suspicious activities to IT staff immediately
We will be happy to coach and guide you in your efforts to tackle Cybersecurity.