We provide Digital Awareness workshop free of cost.
Digital Awareness includes understanding your online identity, protecting your online privacy, increasing your computer security, using social networking wisely and protecting your digital asset
PROTECTING YOUR COMPUTER
Keep your operating system and applications up to date by turning your computer on and off regularly & scheduling weekly updates (see your settings). By doing this your computer can receive important updates that will keep your system safe from recent viruses. Your internet service provider will also help you with concerns you may have about your online security.
Firewall software prevents outsiders from accessing your computer/network (your personal data) when you are on the internet. Keep software up to date.
Antivirus software warns you when unwanted viruses are trying to download to your computer. Viruses interfere with the functioning of your computer. Keep software up to date.
Pop-Ups can conatin adware (pop-ups or banners) or malware (viruses that disrupt the function of your computer an may access email or logins).
PROTECT YOUR MOBILE DEVICE
- Use a password/passcode on your device
- Never leave your device unattended
- Keep your operating system up to date
- Download apps that can trace your device or erase/disable your data if stolen
- Back up your data regularly
- Keep a record of your device's number, make/model, colour/appearance, IMEI & pin numbers
CREATING BETTER PASSWORDS!
Here are some ideas to help create strong passwords:
- Have a unique password for each account
- Use 4-6 randomized words with no association (i.e. recycleknapsackencryptionastonomy) or
- Use 12 or more characters that include upper and lower case letters, numbers, and symbols.
- Keep password reminders in a secure place
- Change passwords at least every 3 months
- Use a trusted password manager (sometimes called a password locker). Check online for reviews - you can start by with:
- Make sure to delete accounts you no longer use
- Keep recovery options updated (email, cell number)
- If possible, use a 2-stage authenication process: for example online banking requires a card number, password, and image authetication
- companies and financial institutions will always call you directly if your account have been compromised
- never click on a link or call the phone number sent to you by email -go directly to your account to check for alerts (open a separate browser)
- never submit financial or sensitive personal information by email
- Don't give out sensitive personal information
- Do not click or respond to: "You've Won!", "Stop" or "No" to stop further texts
- Forward texts to 7726 (SPAM) or your service provider to block future texts
Email Scams ('phishing')
Pharming: Fake or copies of a legitimate website or server, so that when you enter the address, it redirects you somewhere else. Any data entered on this fake site is then stored on the server of this hacker in order to scam innocent people out of their money.
Clickjacking: is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages. (From Wikipedia, the free encyclopedia).
THINK BEFORE YOU SHARE
When you participate and share online, you contribute data to your online identity - this includes...
- What you post about yourself (photos, comments, etc)
- What others post about you
- What you post/repost about others
- Because of the ease at which others can copy and share, these posts can become a permanent record. Before sharing ask yourself….
- do I want to share my thoughts publicly & why?
- who will see it: everyone or only certain people?
- what happens if I want to remove it?
- do I mind others sharing or changing the context?
USING SOCIAL MEDIA WISELY
Understanding and using the privacy settings for each social media service you sign up for will allow you to share certain content and keep other things private or available to only certain people in your network. Beware of the default setting which is often public. You need to manually go in and change your settings to private. Questions to consider when reviewing privacy settings:
- Who sees your profile?
- Who sees the information you share?
- How searchable are you?
- What apps or features of the service have access your information?
- What notifications will you receive?
- What happens if you want to remove information?
We provide Cyber Security workshop free of cost.
Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
THE IMPORTANCE OF CYBER SECURITY
Cyber security is important because government, military, corporate, financial, and medical organizations collect, process, and store unprecedented amounts of data on computers and other devices. A significant portion of that data can be sensitive information, whether that be intellectual property, financial data, personal information, or other types of data for which unauthorized access or exposure could have negative consequences. Organizations transmit sensitive data across networks and to other devices in the course of doing businesses, and cyber security describes the discipline dedicated to protecting that information and the systems used to process or store it. As the volume and sophistication of cyber attacks grow, companies and organizations, especially those that are tasked with safeguarding information relating to national security, health, or financial records, need to take steps to protect their sensitive business and personnel information. As early as March 2013, the nation’s top intelligence officials cautioned that cyber attacks and digital spying are the top threat to national security, eclipsing even terrorism.
CHALLENGES OF CYBER SECURITY
For an effective cyber security, an organization needs to coordinate its efforts throughout its entire information system. Elements of cyber encompass all of the following:
- Network security
- Application security
- Endpoint security
- Data security
- Identity management
- Database and infrastructure security
- Cloud security
- Mobile security
- Disaster recovery/business continuity planning
- End-user education
The most difficult challenge in cyber security is the ever-evolving nature of security risks themselves. Traditionally, organizations and the government have focused most of their cyber security resources on perimeter security to protect only their most crucial system components and defend against known treats. Today, this approach is insufficient, as the threats advance and change more quickly than organizations can keep up with. As a result, advisory organizations promote more proactive and adaptive approaches to cyber security.