Cyber Safety Month summary

  • Published on
    26-Jun-2015

  • View
    1.262

  • Download
    0

Embed Size (px)

Transcript

<ul><li> 1. CYBER SAFETY MONTH HIGHLIGHTSThis slideshow outlines and summarises the mostimportant lessons we hope you took away from our cybersafety monthAll of this information and more is available on the ICTSwebsite at www.icts.uct.ac.za | Anti-Virus &amp; Security |Cyber Safety Month, as well as on our Facebook accountat www.facebook.com/icts.uct</li></ul><p> 2. DID YOU KNOW? 1 in every 436 emails are malicious 1 in every 1.48 emails are spam (67% ofall emails) 1 in every 171.2 emails is a phishingattack 1 in every 340.9 emails contains malware(malicious software) 2200 malicious websites are blocked byISPs per day 3. Do you ever think twice aboutwhat you do or say online?Do you know what phishing is?Hacking? Identity theft?As of 2012, it is estimated that 10.8% of theSouth African population is online, a 100%increase over the last 4 years. This meansthat many people are still new to theInternet and can easily fall prey toscammers. 4. CYBER SAFETYMONTH PART 1:SOCIAL MEDIA SAFETY 5. Facebook, Twitter, and other social mediaare great for keeping up to date with yourfriends and family, but it isnt always wise topost or share everything you think otherswould be interested in.Here are some common sense guidelines that canprotect you against harm when sharing online: Follow the golden rule: If youre not comfortablehaving the whole world know about something, dontpost it. Assume your mother and your boss are reading whatyou post: the things you write or show can come backto haunt you, so be careful of what you say. 6. Regardless of your privacy settings,some people may still be able toaccess content youve restricted. Remember that everything is permanent:Once you post something, consider itpermanently published. Be cautious of predators: Dont postrevealing photos, updates, or content thatwould make you a target of sexual predatorsand other criminals. 7. Never share information that couldendanger yourself or your posses-sions - such as details of your dailyschedule, dates when youll be going onholiday, and what security precautionsyoure taking. Protect sensitive information: Neverreveal sensitive information regardingyour finances or banking. 8. Never share your passwords, or informationthat could give clues to your passwords.Never betray the confidentiality of others. Know who your friends are it is unwise to makefriends with complete strangers on social mediasites - you can never be sure what their motivesare. Always beware of posting your location. Manyapps have location settings, which can be turnedoff. These location settings can show your exactlocation to within a few metres. Especially dontcheck in on social media when youre by yourselfand/or in a remote location. 9. Beware of what you share. Sharing your cell number and address online are riskythings to do - you should limit who sees yourinformation. Know how to use the security settings on all the sitesyou have accounts on. It may seem like a drag, but itcould save your life. Make sure strangers cantharvest your details and use them against you. Assume the world is watching is watching you. If youdont want something widely broadcast, dont post it.Everything that gets on the web, stays on the web. Itcan be in caches, cookies or saved to someoneelses computer, once you post something, considerit permanently published, even if you delete it. 10. Dont share photographs of yourself incompromising positions, and never postextreme views related to race, religion, orpolitics. Also, dont publically air complaints orextreme views relating to your academic orprofessional career, your jobtasks, employer, employees, colleagues, rivals, or anyone in your professional life. Alwaysthink first and then post only if youre surethat there wont be negative repercussionslater on. Beware of clickjacking on social media. 11. CYBER SAFETYMONTH PART 2: PERSONALCYBER SAFETY 12. PART 1: ONLINE SAFETYIdentity (ID) theft is one of the fastestgrowing crimes worldwide with millionsof people having fallen victim to it, andfinancial costs of the crime runninginto billions of dollars.ID theft occurs when criminals steal yourpersonal information and use it for their ownbenefit without your knowledge orpermission.However, there are guidelines you can followto severely reduce the chances of becoming avictim: 13. Always keep your sensitive documents(e.g. ID document, passport, driverslicence) safe. When any of these documents, or yourcredit or debit cards, expire or arereplaced, immediately destroy the oldversion by shredding or destroying papersbefore disposal. Do not ever hand your password over toanyone Consider using an identity theft protectionservice to protect yourself online. 14. Always use different passwords forall your different accounts. If oneaccount is compromised, the otheraccounts remain safe, if all yourpasswords are different. Google Password manager onGoogle. You can find a tool whichallows you to store all yourpasswords safely using one masterpassword to access them. 15. Make your passwords long and strong Use numbers, characters and for the bestpasswords, use a passphrase. Ensure that your bank sends you SMS alertswhen transactions occur in your bank account. When a bill doesnt arrive on time, contact theservice provider to check if theyve sent it toyou. Check your credit rating at least once a year tosee if youve unknowingly been blacklisted orare at risk. South Africans can get a free creditreport once a year from bureaus such asTransUnion or Experian. 16. No reputable organisation will everask for your password, butscammers have been known to go asfar as emailing, phoning and disguisingthemselves as IT technicians to gainaccess to peoples passwords. Dont give out your personal information -such as ID number and home address - topeople or companies you dont know, even iftheyre offering you special deals or claimingyouve won a prize. 17. Help! My identitys been stolen!If youre the victim of identity theft, the first thingyou need to do is report the fraud to the police andobtain a case number. This will assist you whendealing with banks and retailers that the thief hasused under your name and will also help you navigateyour way through the legal system.Its important to report the fraud to the Southern AfricanFraud Prevention Service (SAFPS) (Helpline: 0860 101248).If your ID book and other sensitive documents have beenlost or stolen, register them with the SAFBS via phone(011 867 2234) or email (safps@safps.org.za).In cases of financial fraud, you can also contact theCredit Ombudsman (http://www.creditombud.org.za/) toresolve disputes with credit providers or agents. 18. PART 2 : OFFLINE SAFETYIts essential to take very strong precautionswhen meeting an online friend offline. Thereare no standard rules for staying safe, but someimportant guidelines are: Be paranoid: Be aware that anyone youinteract with online could be a predator indisguise. Verify identity and information: If possible, tryto verify the persons identity in some way forexample by calling the company they say theywork for or Googling them or checking them onsocial media. 19. Retain your privacy: While commu-nicating online, dont give away too much personal information such asyour address, your dailyschedule, financial information, etc. Alsomakeit clear to your friends that they should notgive out such information either. Use alternate contact methods: Dont giveout your primary email address or phonenumbers. Set up alternatives for all themeans you use to communicate withonline acquaintances such as analternate email address, Skypeaccount, and cellphone sim card. 20. Retain your privacy: While communicatingonline, dont give away too much personalinformation such as your address, your dailyschedule, financial information, etc. Also makeit clear to your friends that they should notgive out such information either. Use alternate contact methods: Dont give outyour primary email address or phone numbers. Setup alternatives for all the means you use tocommunicate with online acquaintances such asan alternate email address, chat or Skype account. Report unwelcome behaviour: If the personbecomes abusive or sexually inappropriate withyou online, cut off communication and report themto the police and other relevant authorities suchas the website youre interacting with them on. 21. Meeting an online friend: Never let the person fetch you from homeor work. Meet in public places only. Make it a place of yourchoosing, and somewhere you dont normally go because if things go wrong, you wouldnt wantthem finding you there in future. Try to have a trusted friend with you if possible, orat least make safety arrangements like lettingsomeone know where youre going, who youregoing to meet, and what to do if they dont hearfrom you in a certain period of time. During the meeting, avoid going to any secludedarea where theres no one to see or help you ifthings go wrong. 22. Take things at your own pace. Neverbe pressured to do anything youreuncomfortable with - no matter whatthe person says. From the start of the meeting, lay downyour rules and dont be afraid to end themeeting if they violate your rules. And tryto have your own transport nearby so thatyou can leave quickly if need be. If the person gives you something to eat ordrink, be careful, as it might be spikedwith date-rape drugs or other substances. 23. CYBER SAFETYMONTH PART 3: BANKING ANDBUYING SAFETY 24. Many people have given up standing inlong queues at banks and have insteadopted for online banking.The cool thing about online banking is that youcan access your bank account wherever you are -provided that you have Internet access.The downside is that if a hacker gets hold of yourlog on details, they can access your bankaccount, transfer your funds, and even lock youout of your account.Follow these handy tips for banking and buying: 25. 1. ONLINE TRADING POSTS AND AUCTION SITES When making purchases or selling on Internet tradingportals always read the buying and sellinginstructions carefully. Make sure you understand the policies of the websiteyou are dealing through particularly regarding what itwill and wont do if something goes wrong or afraudulent transaction occurs. You should be able tofind this information easily in its terms and conditions. If you can, do your homework on the buyer or seller.When transacting through an online trading post likeGumtree, make sure that you have the other personsproof of identification, proof of residence, and correctand confirmed contact details. 26. When carrying out thetransaction, ensure that thetransaction is witnessed by at least oneperson, and that a receipt is issued. If the seller is a business, check itsreal-world presence. If they provide aphone number, call them up and verifytheir details. But remember thatoverseas sellers may be harder tochase in the event of a problem. 27. 2. ONLINE SHOPPING SITES Check online stores privacy and returnspolicies to be sure your information willnot be shared and that you are not stuck withmerchandise you didnt order. Be clear about shipping and delivery costs(for example, whether or not they are includedand if not, if they are clearly stated). Be clear about methods of payment andwhether any of these attract any extra costs. 28. Always provide the absolute minimumnecessary personal information tosellers and buyers and nothing more. Bear in mind that paying by credit card offersgreater protection against fraud than otherpayment methods since banks often havemeasures in place to deal with credit cardfraud. Always double check all details of yourpurchase before confirming payment. 29. 3. ALL ONLINE PAYMENTS Before entering payment details on anywebsite, ensure that the site is secure:There should be a padlock symbol in thebrowser window frame, which appears when youattempt to log in or register. Even with a padlock symbol, the site might still befraudulent. Check that the web address beginswith https://. (The s stands for secure.). If youre using the latest version of yourbrowser, the address bar or the name of the siteowner will appear in green. 30. Always keep your receipts electronic or otherwise. Be sure to check your credit card and bank statements carefully afterpayment to ensure that the correctamount has been debited, and also that nofraud has taken place as a result of thetransaction. Check the online security options your bankprovides. Some offer free antivirus andbrowser security software. Remember that UCT staff and students canuse McAfee for free so be sure that you haveit installed. 31. 4. ONLINE BANKING SAFETY Be wary of suspicious looking pop-ups thatappear during your banking session.Memorise the process you normallygo through to make a payment ortransfer, and be suspicious if anythingdifferent happens. Fraudsters sometimes try to trick people intomaking a real payment by phoning andpretending to be from the bank claimingthe transaction is just a test. Neverdisclose passwords or other personalinformation in response to an email, phonecall or letter purporting to be from your bankor other financial institution. 32. Any communication from banks willuse your actual name and verify youraccount details by using securityquestions. Keep your PIN (Personal IdentificationNumber), your password, your credit or debitcard number PRIVATE. Never write them downanywhere and never share them with anyone.Remember that if someone sees your creditcard, they can memorise the numbers and usethese to make purchases without yourknowledge. Always install the latest updates and securitypatches or your operating system when you areprompted to do so. 33. CYBER SAFETYMONTH PART 4:PORTABLE AND PUBLIC COMPUTING SAFETY 34. With the freedom offered by mobile computing,its easy to overlook the basic risks you facewhen doing any kind of computing - viruses.Just as desktop computers need to use antivirussoftware, laptops, mobiles and tablet computersalso need to be protected. wIth the increase ofcomputing applications on mobile phones, eventhese devices are at risk if theyre not secured witha suitable antivirus program.For laptops, UCT staff and students may useMcAfee antivirus free for both their UCT-ownedcomputers and their private computers withoutcharge. For tablet computers and mobile phones, anumber of options are available and can be foundby Googling Antivirus for mobile phones. 35. Are you aware that without you evenknowing it, all the personal informationthat youre entering on a public computerlike at an internet caf may be captured bysomeone else?Hackers and cyber-criminals will do everythingin their power to gain access to yourinformation. One way they do this is to installkeystroke logging software on some publiccomputers.For each and every person using the affectedcomputer, the software can log emails thathave been sent, passwords entered, websitesaccessed, private chats, and file inputs! 36. Using public Wi-Fi is extremely risky.Hackers can intercept everyth...</p>

Recommended

View more >