Professional Documents
Culture Documents
1|Page
Information Security Awareness - Article advantage of software wea+nesses to smuggle malwares onto your gadget via e,ploits. Therefore regular software update can help prevent this.
748RAT 9G $1$T8!$ .R76$8R$ A9T ;< R=$ 7T*8R Windows operating systems, Mac, Ubuntu Chrome, :irefo,, 7pera, nternet 8,plorer 9orton, !acAfee, >aspers+y, .ulldog Adobe Acrobat Reader, Adobe :lash 4layer, ?ava Runtime, @uic+Time <ideo player, <3C, iTunes, 6indows !edia player
Watch out for fake websites and scams. 6ebsites can easily be cloned- doing this does not reAuire a s+illed developer to do so. :a+e websites are used by scammers, to lure you into purchasing goods that will never turn up at your doorstep and also to harvest both credit card and ban+ details. These sites loo+ very real and are normally difficult to differentiate from the original site. .elow are few tips to help you spot fa+e websites. 3oo+ out for the followingB .efore entering any personal information including ban+ details, ma+e sure your internet browser is showing a little padloc+ sign ne,t to the address bar, and also chec+ that the address starts with figure below and not
https://
as shown in
3oo+ out for the correct =R3 ; Chec+ the address in your internet browser's address bar and be sure it matches the site you intended to visit. 8,ampleB "www.baclays.com" instead of "www.barclays.com".
2|Page
Information Security Awareness - Article .e wary of websites that are advertised in unsolicited emails from strangers and trust your instinct if a deal is too good to be true. Avoid scams and fraud. Do not ever give out financial information or personal information over email or te,t. 9ever reply to suspicious loo+ing email. .e aware a ban+ would never send an email claiming your account security has been breached, or as+ing to confirm security details such as passwords or pin numbers. Report any suspicion to the law enforcement agencies Use a secure password and password-protect your devices. =sing a 4assword is one of the simplest steps to ta+e in securing information systems including mobile devices and computers. Recent high profile intrusion into $ony 4lay$tation and Adobe systems showed that many people spend less time on creating secure passwords. 4asswords li+e CD'E"F&C proved to be come among those whose information were stolen from the Adobe system. Regardless of the system, whether it is your device, windows login, website login or email account, ma+e sure you always use secure passwords. A secure password should consist of the followingB Alphanumeric characters and should be at least eight characters long. The password must contain an uppercase, a number, and a special character. Avoid using commonly used words and names, but Gust in case you have to, convert them to be secure. :or e,ample am going to convert my name "Edem a secure password. "3
Boni" to
3m!B"n#".
t is also advisable to use different passwords for different accounts to protect them further.
Do not reply to Pop-upsB f a window open promising you a gift or cash in return for you answering a Auestion or ta+ing part in a survey, close it by pressing Control H :" on a 6indows machines and Command H 6 on a !ac machine. Do not use public computers or public wireless internet for your shopping online: 4ublic computers may contain malicious software that obtains credit card information when placing an order. Criminals may also intercept traffic on public wireless networ+s to acAuire credit card numbers and other information.
3|Page
Information Security Awareness - Article Pay by redit card and not Debit card: $hopping on the nternet in the safest way possible is by using Credit cards rather Debit cards. Credit cards are protected by the :air Credit .illing Act and reduce your liability, if your information is used wrongfully. Print or save all online transactions: 4rinting or saving all your online transactions, including the online receipt 2which should include product description and price5 and the correspondence sent between the seller and buyer. Always chec+ credit card statements as soon as they arrive to confirm the transactions are correct. f not contact the credit card company immediately to clarify the charges and for proper action to be ta+en where reAuired. Understand the Privacy policies: 4rivacy policies are available on most online merchantsIwebsites, and review what information is collected, how it will be stored and used and if the information will be shared with other parties. $ow to sol%e problems with online shopping sites& Contact the site operator or seller directly to find a resolution. Also search for more detailed information on the following lin+sB
httpBIIwww.getsafeonline.orgI httpBIIwww.bbc.co.u+IcbbcItopicsIstay;safe
httpsBIIwww.thepaypalblog.comI'(D'ID(Iprotect;yourself;from;cyber;crime;this; holiday;shopping;season
httpBIIwww.ftc.govIopaI'(DDIDDIholidayshopping.shtm
httpBIIwww.dailydealmedia.comIJ)%online;shopping;e,pected;to;rise;nearly;DJ;this; holiday;seasonI :or more information on cyber security, feel free to contact me via emailB edem+ofiboniKgmail.com or boniLedemKyahoo.com.
4|Page