Top 4 ways to #BeCyberSmart in 2022

Eleanor Milner
Media Assistant

October 14, 2022

October marks the start of Cyber Security Awareness Month, a collaboration between government and private industry to raise awareness about digital and security with aims to empower individuals to protect their personal data from online crime.

Marking the 19th year of Cybersecurity Awareness Month, this year is dedicated to increasing resources to encourage organisations to talk to employees and customers about staying safe online. Co-led by the National Cybersecurity Alliance and the Cybersecurity and Infrastructure Agency, with the overarching theme for 2022: See Yourself in Cyber.

This year, the focus of the month is on the following four key behaviours with the aim to raise awareness and increase online safety.

1. Enabling Multi-Factor Authentication 

Sometimes referred to as two-factor authentication, this is a security measure that requires anyone logging into an account to go through a two-step process to prove their identity.

Increasing protection by making it twice as hard for criminals to access online accounts.

So how does it work? Simply adding another step to the logging-in process, may include an extra pin, a security question, an additional code or perhaps a unique number.

While not every account offers multi-factor authentication, it is becoming increasingly popular. Typically found on accounts that hold either valuable financial or personal information such as banks or social media.

Any online accounts that store personal information or any account that can be compromised and used to  trick or defraud someone else could be prevented by using multi-factor authentication.

2 . Strong Passwords and Password Manager

Treat your online passwords as you would your house keys, and do everything you can to keep them safe. Protecting passwords is particularly important as it is usually our first line of defence against criminals.

How do I create a strong password? Long, unique, and complex. Aim to make your password at least 12 characters long, avoid reusing old passwords and try to use a combination of upper and lowercase letters as well as numbers and special characters.

If you follow these guidelines, then you should not have to change your password unless you believe it is compromised. According to the National Institute of Standards and Technology, frequently changing your password could put you at risk of reusing old passwords or falling into bad habits such as creating similar or weak passwords.

PASSWORD FAQS

  • Have trouble remembering all your passwords?
  • What is a password manager?
  • What examples of password managers are there?

3. Updating Software

Keeping your software updated is important as it helps fix general issues and problems and could provide security patches where criminals could gain access.

Since you can only get software updates from the company that created it, avoid using any hacked, pirated or unlicensed versions of software updates.

Don’t ignore the software update notification! Many companies usually provide the option to make the software automatically install when the update is available. It gives a reminder so you can easily begin the process.

How do I spot a fake? If you see a pop-up window when visiting a website or opening software that urgently asks you to download something or fill out a form? These are typically fake.

4. Phishing

The most common type of attack, Phishing is when criminals use fake emails, social media posts or direct messages with the goal of luring you to click on a bad link or download a malicious attachment.

By clicking these links, you are handing over your personal information to a cybercriminal, or installing malware onto your device.

Considering that 95% of cyber security breaches are caused by human error, it is important you know ways to spot phishing emails to prevent breaches.

How to spot a phishing email?

Try asking yourself the following questions.

  • Does it contain an offer too good to be true?
  • Does it include language that is urgent, alarming or threatening?
  • Is it poorly crafted, containing misspellings or bad grammar?
  • Is the greeting ambiguous or generic?
  • Does it ask you to send personal information?
  • Is it a strange or abrupt business request?
  • Is their email address incorrect?

 

Once you identify that it is a phishing email, simply report it to your work email address, and report to your IT manager or security officer as quickly as possible.

If the email is in your personal email address make sure not to click ANY of the links, not even the unsubscribe or reply button. Just delete. While blocking and reporting it will help increase your protection further.

 

HOW DTP CAN HELP?

 

At DTP we understand the importance of security, which is why we have a carefully selected portfolio of cybersecurity solutions. Ranging from solutions such as Darktrace, Endpoint Security from HP, HP Wolf security and Continuous data protection from Zerto. 

Contact our team to learn more.