Uh-oh, think you clicked a suspicious link?! Here’s what to do
Phishing attacks that contain suspicious links can pop up at any time, whether you’re at work, on your personal email account, or …
In a world increasingly dependent on digital platforms, you may wonder how likely it is that you’ll fall victim to a scam.
In a world increasingly dependent on digital platforms, you may wonder how likely it is that you’ll fall victim to a scam.
Scams aimed at individuals and businesses have become more sophisticated and their consequences more profound. However, the good news is that your risk of becoming a victim can be minimised with strong cybersecurity hygiene.
By adhering to a few crucial practices, you can stay one step ahead of potential threats and protect your personal and financial information. Tools like eftsure’s Breach Checker can also help you take proactive measures in the event your email address has been involved in a data breach.
With the above in mind, here are some questions that define cybersecurity hygiene and how you can adopt it in practice.
Passwords are your first and most basic defence. But the effectiveness of this defence depends on the password you choose and whether you use it elsewhere.
A strong, unique password is essential to keeping cybercriminals at bay. Nevertheless, many still use weak passwords or recycle the same password across multiple accounts.
If you are prone to these habits, understand that it is giving hackers an easy entry point.
Conventional wisdom once said that passwords should be updated every three months or so, but with two-factor authentication (2FA) in place, they should only be changed if there is reason to believe the account has been compromised.
Nevertheless, some best practices for passwords include:
For managing multiple strong passwords, consider using a password manager to securely store and generate complex passwords.
If you’re not using two-factor authentication (2FA), your strategy to protect yourself from bad actors is incomplete.
Even the strongest password can be compromised. However, 2FA adds an additional layer of security that requires a second form of verification such as a code sent to your phone or email.
This ensures that even if someone has access to your password, they must still provide a secondary authentication factor to access your account.
Most major services such as banking apps, email providers and social media platforms offer 2FA.
The specific factors in a 2FA process vary, but in short, they are based on:
Phishing attacks are among the most common ways scammers obtain access to personal information.
These attacks tend to present themselves as emails or texts that appear to be from authentic sources, but they’re designed to trick you into revealing sensitive information like your bank account details username and password.
To recognise a phishing attack, be on the lookout for:
For many businesses, outdated software is the most significant vulnerability in their cybersecurity armour. In fact, up to 60% of data breaches are caused by known software vulnerabilities that have not been patched.
Scammers and hackers frequently exploit known weaknesses in older software versions and use them to secure unauthorized access to systems. From there, ransomware and malware can severely disrupt operations.
Ensure that all your devices – from laptops to smartphones – are running the latest versions of their respective operating systems. It is also important to make sure that web browsers, extensions and antivirus software are up to date.
To that end, enable automatic updates where possible to ensure that software is always patched against the latest security threats.
Backing up your data is an essential part of cybersecurity hygiene, but it is often a task that is put off for another day.
Irrespective of whether your data contains personal files, photos or work documents, a secure backup ensures that you won’t lose everything in the event a system is compromised or held ransom in a ransomware attack.
Back up your data to an external hard drive or cloud-based storage service with secure encryption, and update your backups frequently so that more recent files are safe and secure.
At the most fundamental level, privacy means you don’t post potentially compromising information in public (such as on social media). This includes your home address, phone number and other sensitive information a fraudster could use to impersonate you or steal your identity.
Secure networks are also an important aspect of online privacy – particularly when accessing or entering sensitive data such as bank account details, emails and work files.
While no doubt convenient, remember that public Wi-Fi networks are unsecured. Hackers can easily intercept your data and access login credentials, personal information and even your private communications. These data are often stole as part of a man-in-the-middle (MITM) attack.
Virtual private networks (VPNs) are useful if you must use public networks. Otherwise, ensure that the websites you frequent are HTTPS-encrypted and always enable firewalls on whatever device you’re using.
While there are no guarantees, these cybersecurity hygiene best practices can dramatically reduce your risk of falling victim to online scams.
Each question you can answer in the affirmative makes it more difficult for cybercriminals to access your personal data. But if you suspect your email has been compromised, use eftsure’s Breach Checker tool to verify whether you need to take corrective action and protect your data.
Phishing attacks that contain suspicious links can pop up at any time, whether you’re at work, on your personal email account, or …
Accounting problems are issues that create a material financial statement error, hide fraud due to poor internal controls, stray from Generally Accepted …
Internal controls over vendor master file keep your data secure with clear rules, audit trails, and consistent oversight for long-term data integrity
End-to-end B2B payment protection software to mitigate the risk of payment error, fraud and cyber-crime.