General Cybersecurity Awareness |
Safe Online Practices |
Device Security |
27 May 2024 | 2 min read
Be Aware of Phishing Attempts That Trick You into Providing Personal Information
Look out for emails or messages requesting sensitive information or urging immediate action, especially if they contain suspicious links or come from unfamiliar or unexpected sources. Phishing attacks can appear real and believable. They can come through many different methods such as email, text message as well as phone calls and voicemails.
Secure Your Accounts with Multifactor Authentication (MFA)
Secure Locks: Use passcodes, fingerprint scans, facial recognition, or swipe patterns to lock your devices.
App Selection: Download apps cautiously and ensure they do not require excessive permissions.
Regular Updates: Always update to the latest operating system and app versions for enhanced security.
Avoid Public Wi-Fi: Be wary of unsecured public Wi-Fi networks; use a VPN if necessary.
Backup Data: Regularly back up important data to secure cloud storage or an external drive.
Disable Autofill: Turn off autofill settings to prevent unauthorized access to your personal data.
Implement Good Social Media Habits
Avoid Oversharing - think about how your data, files, photos, and location information would be used by others. Assume anything you post will eventually become public and will live on the internet forever. You should not share information that indicates you will be away from home for a long period of time.
Check Privacy and Security Settings – These settings help control which apps can track you and who can see your personal information, such as your address, phone number, email, and other sensitive data. These settings can be confusing and change often.
Practice Messaging Do’s and Don’ts – Don’t open attachments you are unsure of especially if they are ZIP files. don’t click on links from emails or text messages that you were not expecting, double check senders and recipient email addresses and names, look for misspelling and grammatical errors, be cautious when replying in group chats or distribution lists, use direct face to face communication when possible, delete suspicious messages, use encryption and secure messaging apps when emailing sensitive information.
Attention!
This site is best viewed in a modern browser and is not compatible with Internet Explorer (IE). Please use another browser, such Chrome, Safari, Edge, or Firefox for the best user experience.