Cyber Security:
|
|
This will prevent anyone tampering with your devices or impersonating you on social media, if you leave them unattended or they get stolen. Without a user account and password, an attacker is forced to use much more time-consuming techniques to break into the machine, greatly increasing their risk of being caught. |
|
Keep a note of the new password in a safe place. Most hackers will use your router to access your wireless home network as they almost know all default passwords of a router. Updating your default router password can help keep your home network safe and improve your device security. |
|
Neither in an e-mail or on a website.
|
|
Ensure your software is the latest version and keep an eye open for the latest 'patches' or versions. |
|
Ensure you have: - Made a note of all software that you use and all licence keys. - Stored these separately from your computer - Kept all your data backed up on a write only system - Checked that you can install all essential software and data onto a new system - Backed up your digital assets. |
|
Use two factor authentication (2FA) to access your accounts. |
|
Before you install or change anti-malware software you should check the reviews from a number of reputable and independent organisations. Look at how they rate the free packages as well as the paid for packages. |
|
A network firewall installed on a router and a personal firewall on the computer itself will stop hackers from getting into your computer. |
If you do lose data a backup helps you get up and running quickly. |
|
|
If your device has sensitive data on it or if you have access to financial sites on there - such as banking apps never use 'free wi-fi'. |
Especially on laptops! |
|
|
With the rise of AI and modern processing power brute force attacks on computers are child's play. |
|
There are many malware laden sites out there. Be careful! |
|
Enable junk mail screening. Your mail program will then scan incoming email looking for suspicious messages that might be trying to scam you – or are just annoying spam - putting any suspect messages into a junk mail folder where you can examine them later, just in case any genuine messages were misfiled. |
|
There are many people out there trawling for your information so they can sell it on to hackers and fraudsters. Keep your information private - especially information relating to words you may use as part of passwords or as an answer to security questions. |
What to do if you think you have been hacked or had your identity stolen.
Click here to go to the full index of page topics on this site