This week Tom Webb had a chat to Rex about cyber security and the recent data breach at the Waikato DHB.
During Tom’s interview with Rex he mentioned he wanted to provide some more advice and tips for our listeners;
- Be aware that everyone is a potential target for attack, and it can happen to anyone, anytime, anywhere, on any device. Do not ever think “It won’t happen to me”.
- Use good password management. Use a strong mix of characters, and do not use the same password on multiple sites or services. Do not share your password with others, and do not write it down and leave it in obvious places like Post-It notes attached to your computer. For further protection, enable two-factor authentication on all sites and services that offer it. While you have to do an extra step in logging on, those attackers don’t have your phone to verify that 6-digit code and helps stop them from being able to log into your accounts.
- Never leave your devices unattended. If you must leave your computer for any length of time, no matter how short, lock your screen. If you have sensitive information on USB sticks or external drives, make sure you lock those away as well.
- Always be careful when clicking on attachments or links in emails. . If an email is unexpected or suspicious for any reason, do not click on it. Even if it seems like it is from your company Boss! Scammers can look up that information online and use it to target individuals in your company. Double-check the URL of the website to see if it looks legitimate. Bad actors will often take advantage of spelling mistakes to direct you to a harmful domain.
- Sensitive browsing, such as banking or shopping, should only be done on a device that belongs to you, on a network that you trust. Whether you are using a friend’s phone, a public computer, or free Wi-Fi at a coffee shop — your data could be copied or stolen.
- Back up your data regularly. Make sure your antivirus software is always turned on and up to date.
- Be conscientious of what you plug into your computer. Malware can be spread through infected flash drives, external hard drives, and even smartphones. You might want to help someone find their lost item but end up falling into a trap.
- Watch what you are sharing on social networks. Criminals can find you and easily gain access to a shocking amount of information — where you go to school, where you work, when you are on vacation — that could help them gain access to more valuable data.
- Be wary of social engineering, where someone attempts to gain information from you through manipulation. If someone calls or emails you asking for sensitive information like login information or passwords, it is okay to say no. You can always call the company directly to verify credentials before giving out any information.
- Be sure to monitor your accounts for any suspicious activity. If you see something unfamiliar, it could be a sign that you have been compromised. Do not be afraid to speak up and tell your IT team if you notice anything unusual. Remember, you are the victim of the attack, and you are not in trouble!