Resource Centre

undefined

 

In 2016 an estimated 3.6 million cases of fraud and 2 million cases of computer misuse were reported to the police. Many of these crimes could have been prevented by making a few small changes in our online behaviour both at home and at work.

 

To avoid becoming a victim of online crime you don’t need to be acomputer expert. By taking some simple steps you can drastically reduce the chances of becoming a victim of cybercrime,

The 2 documents below are a 'useful links and resources document' and our 'menu of service', detailing what the protect team can offer your organisation. 

Useful Link and Resource LeafletMenu of Service Leaflet  undefined

The below social media privacy guides have been produced by Elly Stirling in the Yorkshire and Humber Regional Cyber Crime Unit as a walkthrough to securing your social media accounts. click on the thumbnail below to be linked to the corresponding PDF file.

Facebook Social Media GuideTwitter Social Media GuideInstagram Social Media GuideLinkedin Social Media GuideSnapchat Social Media Guide

Visit Cyber Aware for step-by-step instructions on keeping your devices up-to-date with the latest security updates, and for more cyber security advice to keep you safe online.

There are a wealth of free resources available online aimed at keeping you safe online at home and at work. We can signpost organisations and individuals to the correct resources to ensure you get the support you require. 

Cyber Security: Small Business Guide 

Cyber Security Information Sharing Partnership (CiSP)

Get Safe Online

Cyber Aware

These short videos explain some of the common threats and how to safeguard yourself from them. Credit to the Metropolitan Police Service and Falcon for the videos.

 


Passwords

 

Create a password that’s too hard for criminals to crack by choosing three random words, numbers and symbols.

 

WiFi

 

Don’t do banking, online shopping or anything that needs you to enter login details while using public WiFi.

 

Online ID

 

Stop thieves stealing from you: update privacy settings on all social media accounts and only let people you’re connected to see your pages.

 

Phishing

Phishing emails are designed to steal from you by installing malicious software on your computer. Don’t click on links from suspicious sources.

 

Updates

Accept all updates when asked: they’re vital in protecting your computer and your identity from cybercriminals.

 

undefined


 

Useful Websites

Further resources from the NCSC (National Cyber Security Centre)

Useful PDF’s on Current Threats and Mitigation

Further Information:

  • Make you passwords slightly more complex
    • https://www.ncsc.gov.uk/blog-post/three-random-words-or-thinkrandom-0
    • Current best practice advises THREE RANDOM WORDS.  Add complexity, convert some letters to numbers and add special characters
    • For example BEACHFENCELAMP, to add complexity 8EACHF3NC3L$MP!
    • Your single most important account and password is your email – effectively, anyone taking control of your email can then reset all your other passwords locking you out.
    • Don’t use words / names / information that may be in the public domain or easily worked out from social media content, such as Mum’s maiden name; Date / Place of birth; pets names; teams you support etc…
    • ALWAYS REMEBER to change default passwords on all SMART devices/routers for your own unique one
    • ALWAYS REMEMBER to log out of sites you have logged in to – especially on shared / public devices / machines

 

  • Make yourself more secure at home.  A Secure Device means:

    an operating system and all applications with up to date software patches from their respective manufacturers;

•       an up to date browser

•       an installed fully operational anti-virus product with up to date configuration data;

•       an installed fully operational anti-spyware product with up to date configuration data; and

•       an installed operational firewall

•       enable 2 step factor authentication

  • Look at your social media settings…
    • Opt for “Friends only”
    • Be a good friend and change your settings to ‘hide’ your friends list to protect their security too.  Also helps prevent account cloning issues
    • “closed” groups are often open to the public, even though a closed group requires admin approval to join!
    • Whenever Apple, Android or FB app updates, check your privacy settings to ensure they haven’t reverted to the default “public” setting
    • Be mindful that “friends” settings can affect your own security. Your friend “Jack” may comment on your post, but depending on his settings, his friends may be able to see, comment on and potentially share your original post.
    • turn location settings off when you post to social media as it indicates your current location
    • Be mindful of regularly checking in to places as it highlights a pattern – also, remember ‘checking in’ is publically viewable
    • Change Facebook settings make old Timeline posts visible only to you
    • Check that photos are not “publicly available”
    • Opt to approve photos and posts by others before they appear on your timeline
    • Spring clean and remove any posts that may not show you in a positive way
    • Delete any old social media accounts you no longer use