10 Steps to Personal Cybersecurity
1. Don’t post any personal information online.
Don’t post your address, Date of Birth, email address, or mobile phone number. Think carefully before posting pictures or videos of yourself. Once you’ve posted a photo of yourself online, most people can see it, and it will likely stay there forever. Set security settings for each image you post, especially when using social media sites. Keep your privacy settings as high as possible, and if you are unsure, visit www.getsafeonline.org.
2. Be careful what you do online.
Don’t befriend people you don’t know online; they may not be who they say they are. Don’t meet up with people you’ve met online. Speak to a friend, parent or carer about people suggesting you do. Think carefully about what you say before you post something online; remember you are publishing something, just like a newspaper does. Think about what you are saying; you may get into trouble if you don’t. Respecting other people’s views, even if you disagree with someone else’s, doesn’t mean you need to be rude again. You could find yourself in trouble or even, in some cases, committing a criminal offence.
3. Keep software up to date.
Installing software updates for your operating system and programs is critical. Always install the latest security updates for your devices, turn on automatic updates for your operating system, and use web browsers such as Chrome or Firefox that receive frequent, automatic security updates. Keep browser plug-ins (Flash, Java, etc.) up to date.
4. Avoid Phishing scams – beware of suspicious emails and phone calls.
Phishing scams are a constant threat. Using various social engineering (link is external) ploys; cybercriminals will attempt to trick you into divulging personal information such as your login ID and password or banking or credit card information. Phishing scams can be carried out by phone, text, or social networking sites, but they are most commonly carried out by email. Be suspicious of any official-looking email message or phone call that asks for personal or financial information.
5. Practice good password management.
We all have too many passwords to manage – and it’s easy to take shortcuts, like re-using the same password. A password management program can help you maintain strong, unique passwords for all your accounts. These programs can generate strong passwords, enter credentials automatically, and remind you to update your passwords periodically.
6. Be careful what you click.
Avoid visiting unknown websites or downloading software from untrusted sources. These sites often host malware that will automatically, and often silently, compromise your computer. If attachments or links in an email are unexpected or suspicious, don’t click on them.
7. Never leave devices unattended.
The physical security of your devices is just as important as their technical security. If you need to leave your laptop, phone, or tablet for any length, lock it up so no one else can use it. If you keep sensitive information on a flash drive or external hard drive, keep these locked. For desktop computers, shut down the system when not in use or lock your screen.
8. Install antivirus protection.
Only install an antivirus program from a known and trusted source. Keep virus definitions, engines and software updated to ensure your antivirus program remains effective.
9. Back up your data.
Back up regularly. If you are a victim of a security incident, the only guaranteed way to repair your computer or phone is to erase and reinstall the operating system.
10. Use mobile devices safely.
Considering how much we rely on our mobile devices and how susceptible they are to attack, you’ll want to make sure you are protected:
- Lock your device with a PIN or password – and never leave it unprotected in public.
- Only install apps from trusted sources.
- Keep your device’s operating system updated.
- Don’t click on links or attachments from unsolicited emails or texts.
- Avoid transmitting or storing personal information on the device.
- Most handheld devices can employ data encryption – consult your documentation for options.
- Use Apple’s Find My iPhone or the Android Device Manager tools to help prevent loss or theft.
- Back up your phone data.