In 2016 an estimated 3.6 million cases of fraud and two million cases of computer misuse were reported to the police. Many of these crimes could have been prevented by making a few small changes in our online behaviour both at home and at work.
To avoid becoming a victim of online crime you don’t need to be a computer expert. By taking some simple steps you can drastically reduce the chances of becoming a victim of cybercrime,
Visit Cyber Aware for step-by-step instructions on keeping your devices up-to-date with the latest security updates, and for more cyber security advice to keep you safe online.
These short videos explain some of the common threats and how to safeguard yourself from them. Credit to the Metropolitan Police Service and Falcon for the videos
Create a password that’s too hard for criminals to crack by choosing three random words, numbers and symbols.
Don’t do banking, online shopping or anything that needs you to enter login details while using public WiFi.
Stop thieves stealing from you: update privacy settings on all social media accounts and only let people you’re connected to see your pages.
Phishing emails are designed to steal from you by installing malicious software on your computer. Don’t click on links from suspicious sources.
Accept all updates when asked: they’re vital in protecting your computer and your identity from cybercriminals.
- If you look after a network please join the CiSP (Cyber Security Information Sharing Partnership) platform
- 10 steps to cyber security provided by the National Cyber Security Centre
- Weekly threats reports provided by the National Cyber Security Centre
- Various infographics provided by the National Cyber Security Centre
Further resources from the NCSC (National Cyber Security Centre)
- Small Business Guide - https://www.ncsc.gov.uk/smallbusiness
- NCSC Glossary - https://www.ncsc.gov.uk/glossary
- Password Guidance - https://www.ncsc.gov.uk/guidance/password-guidance-simplifying-your-approach
- 10 steps to Cyber Security - https://www.ncsc.gov.uk/guidance/10-steps-cyber-security
- Common Cyber Attacks - https://www.ncsc.gov.uk/content/files/protected_files/guidance_files/common_cyber_attacks_ncsc.pdf
- Bring Your Own Device Guidance - https://www.ncsc.gov.uk/topics/byod
- Managing Information Risk - https://www.ncsc.gov.uk/guidance/risk-management-collection
- General advice on Cyber Security for Business & Public from HM Government
- Take 5 to stop fraud
- Action Fraud reporting and information portal
- Get Safe Online is the UK’s leading source of unbiased, factual and easy-to-understand information on online safety
- Government initiative to ensure good cyber security principles - Cyber essentials
- Europol supported ransomware website
- Information Commission Office - Practical advice on how to keep data secure
- Open University course – introduction to Cyber Security
- Free Online training for business’s of all sizes
- Check to see if your email address has been compromised
- Check the strength of your password
Useful PDF’s on Current Threats and Mitigation
- The Little book of big scams
- The Little book of Cyber scams
- The Little book of Big scams (Business Edition)
- Make you passwords slightly more complex
- Current best practice advises THREE RANDOM WORDS. Add complexity, convert some letters to numbers and add special characters
- For example BEACHBUCKETSPADE, to add complexity 8EACH8UCK3TSP4DE£
- Your single most important account and password is your email – effectively, anyone taking control of your email can then reset all your other passwords locking you out.
- Don’t use words / names / information that may be in the public domain or easily worked out from social media content, such as Mum’s maiden name; Date / Place of birth; pets names; teams you support etc…
- ALWAYS REMEBER to change default passwords on all SMART devices/routers for your own unique one
- ALWAYS REMEMBER to log out of sites you have logged in to – especially on shared / public devices / machines
- Make yourself more secure at home. A Secure Device means:
an operating system and all applications with up to date software patches from their respective manufacturers;
• an up to date browser
• an installed fully operational anti-virus product with up to date configuration data;
• an installed fully operational anti-spyware product with up to date configuration data; and
• an installed operational firewall
• enable 2 step factor authentication
- Look at your social media settings…
- Opt for “Friends only”
- Be a good friend and change your settings to ‘hide’ your friends list to protect their security too. Also helps prevent account cloning issues
- “closed” groups are often open to the public, even though a closed group requires admin approval to join!
- Whenever Apple, Android or FB app updates, check your privacy settings to ensure they haven’t reverted to the default “public” setting
- Be mindful that “friends” settings can affect your own security. Your friend “Jack” may comment on your post, but depending on his settings, his friends may be able to see, comment on and potentially share your original post.
- turn location settings off when you post to social media as it indicates your current location
- Be mindful of regularly checking in to places as it highlights a pattern – also, remember ‘checking in’ is publically viewable
- Change Facebook settings make old Timeline posts visible only to you
- Check that photos are not “publicly available”
- Opt to approve photos and posts by others before they appear on your timeline
- Spring clean and remove any posts that may not show you in a positive way
- Delete any old social media accounts you no longer use