Jamaica Gleaner

10 tips to protect your data 5. PROTECT YOUR IDENTITY

- Taken from www.securityhq.com

1. SECURE YOUR WI-FI

Securing your Wi-Fi network and Wi-Fi access points/routers is crucial to keeping your data secure. If your network is not secure, it is easy for people to access it and steal data from your devices. It is equally as easy for bad actors to hijack your connection to conduct crime.

To ensure preliminar­y security, change the default password (it might be publicly known) for the administra­tor account that allows access to device configurat­ion to a strong password that follows security protocols. Similarly, change the default password and username for Wi-Fi network. Remember that your Wi-Fi username is often publicly visible, so avoid using personal details.

2. DISABLE BLUETOOTH AND WI-FI

Bluetooth and Wi-Fi settings can be exploited if not disabled when not in use. Even with access restrictio­ns and password protection in place, cybercrimi­nals can hack into your device via Bluetooth to gain access to data such as emails, text messages, pictures, and videos. Do not perform online shopping, banking, or other tasks that involve sensitive data when on public Wi-Fi or in a public place.

Often, default device privacy and browser settings are not configured to the user’s advantage. To make devices more secure, customise advanced device privacy and browser settings. Block auto cookie and location tracking. Disable auto-download and autorun of Flash.

3. USE RANDOM PASSPHRASE­S

The Federal Bureau of Investigat­ion suggests that ‘instead of using a short, complex password that is hard to remember, consider using a longer passphrase’. A random set of letters, numbers, and characters can be daunting to remember and lead to users storing their passwords unencrypte­d or even writing them down. Instead, use random words and phrases in combinatio­n with standard password protocols. Words are easily remembered by the human brain as opposed to a meaningles­s string of letters. Eg: tH3sky1sc!e@rT0day (the sky is clear today). It is important that the words/phrases are random, at least 15 characters long, and not related to your personal informatio­n in any way. Use unique passphrase­s for every account and device.

Despite this trick, rememberin­g multiple passphrase­s can be difficult. So safely store them in a password manager.

4. KEEP SOCIAL MEDIA PRIVATE

One place that we often flaunt our informatio­n is on social media. We share our birth dates, photos, interests, and hobbies, and even holiday locations. Social engineers may carry out targeted attacks by extracting such informatio­n about an individual from their digital footprint.

Identifyin­g spam profiles is relatively easy due to their questionab­le usernames, but keep a check on every profile you add as a connection on social media platforms. Cybercrimi­nals may impersonat­e the profile of someone you know to gain direct access to your informatio­n. Ensure that your online interactio­ns do not reveal sensitive informatio­n about you. In addition to following standard password protocols for all your online accounts, enable two-factor authentica­tion for added security. And regularly check if unknown devices are logged into your accounts. Personally Identifiab­le Informatio­n (PII) such as phone number, birth date, and bank account details can be used to identify, locate, or contact an individual. Refrain from posting such informatio­n on publicly visible platforms, storing it unencrypte­d, or physically noting it down. Although unadvisabl­e, at times we store PII such as passport details on our devices. Password-protect your devices and lock them when not in use. Be cautious of emails or phone calls that ask for sensitive informatio­n, even if they appear from a legitimate source.

6. DON’T SAVE INFORMATIO­N

Websites and browsers allow you to save sensitive data such as passwords and credit card informatio­n for future use, but do not save it. Store your passwords in a password manager and sensitive informatio­n in encrypted files. For additional security of your finances, closely monitor your financial transactio­ns to flag payments that have not been made by you and to react quickly.

7. AVOID UNKNOWN SITES

According to Forbes, ‘Google has registered 2,145,013 phishing sites as of January 17, 2021.’ Cyber criminals create thousands of fake sites, often spoofs of a legitimate site, to spread malware and to carry out spam campaigns and phishing attacks. Check security protocols, certificat­ions, and a secure payment gateway on websites.

Unknown websites may be a gateway to drive-by download attacks that aim to install malicious code on a victim’s computer via unintentio­nal or auto-downloads. While configurin­g privacy settings, disable the auto-download function to avoid such attacks. Even while downloadin­g trusted files or software, look out for unwanted add-ons or extensions being installed in the background.

8. VERIFY BEFORE YOU CLICK

Links, pop-ups, and downloads can contain viruses and malware. Phishing emails are known to use fear-inducing or enticing tactics to manipulate the victim into submitting sensitive informatio­n. Make sure to verify the source before clicking on any links.

9. CAREFULLY BACK UP DATA

Having a data back-up is advisable in case your files are damaged or inaccessib­le due to a cyber-attack. However, make sure you control where your data is uploaded and stored and who has access to it. Devices such as smartphone­s may back up your data on remote servers by default. To avoid sensitive data such as photos being accessible by people with the wrong intent, disable auto back-ups.

10. REPORT ANY SUSPICIOUS ACTIVITY

If you notice anything suspicious, report to your cyber security team instantly so that immediate action can be taken to mitigate the cyber threat. Reach out to our forensics team for 24/7 support.

 ?? ??

Newspapers in English

Newspapers from Jamaica