Introduction
This guide aims to raise awareness about the tactics cybercriminals use to target individuals and provides actionable steps to protect yourself from potential cyber threats.
Understanding the Threat
Cybercriminals employ various techniques, such as social engineering and phishing, to steal sensitive data or identities. Depending on the information they obtain, they may:
Access your email accounts.
Gain entry to your bank accounts.
Utilize your credit cards.
Create new identities using your information.
They may also deceive you into installing malicious software, granting them full access to your computer and sensitive data. This malware can:
Encrypt your files and demand ransom for decryption.
Log your keystrokes to capture passwords to bank accounts and credit cards.
Send emails containing malware to others, including your contacts.
Use your computer as part of a botnet to launch attacks on other systems and users.
Remember, cybercriminals target anyone connected to the internet, including you. No matter where you are—work, home, or traveling—it's essential to remain vigilant. You are the first line of defense against cyber attackers. Think before you click.
Protective Measures
By following these steps, you can enhance your cybersecurity:
Trust Your Instincts: If something seems odd, suspicious, or too good to be true, it is most likely an attack.
Keep Systems Updated: Regularly update your operating system and software on all computers and mobile devices to patch security vulnerabilities.
Use Strong, Unique Passwords: Create robust passwords for each of your accounts and avoid reusing them across multiple platforms.
Encrypt Sensitive Data: Before emailing sensitive information, ensure it is encrypted and password-protected.
Handle Phishing Emails Cautiously: Never respond to suspicious phishing emails; if in doubt, report and delete them.
Be Mindful Online: Be cautious about the personal information you share on social media and other online platforms.
Secure Mobile Devices: Enable a PIN or passcode on your mobile devices and only download apps from reputable sources like the Apple App Store or Google Play Store.
What to Do If You're Targeted
If you suspect you've fallen victim to a cybercriminal:
Contact IT Support Immediately: Reach out to the IT support team for assistance.
Change Passwords: Update passwords for your accounts, especially those related to banking and email.
Monitor Financial Accounts: Keep a close eye on your bank and credit card statements for any unauthorized transactions.
Scan for Malware: Use reputable security software to scan your devices for malicious software and remove any threats detected.
Additional Resources
FAQs
Q: How can I identify a phishing email?
A: Phishing emails often contain urgent messages, unsolicited attachments, or links to unfamiliar websites. Be cautious of emails requesting personal information or urging immediate action. For more details, refer to our Phishing Awareness Guide.
Q: What should I do if I receive a suspicious email?
A: Do not click on any links or download attachments. Report the email to your IT support team and delete it from your inbox.
What makes me the Target?
Cyber criminals know that the more credit cards they steal, the more bank accounts they hack, or the more passwords they compromise; the more money they can make. They will literally attempt to hack anyone connected to the Internet, including you.
Cyber hackers will try to use different techniques such as social engineering and phishing in order to steal your sensitive data or your identity. Depending on the information they receive, they may:
- Access your email.
- Access your bank account.
- Access your credit cards.
- Create new identities.
They may also try to trick you into installing malicious software which will grant them full access to your computer and to your sensitive data. This malicious software may allow the creators to:
- Encrypt your files and hold for ransom.
- Log your keystrokes to discover your passwords to bank accounts and credit cards.
- Send email containing malware to others, including your own contacts.
- Use your computer as a bot to launch attacks on other computers and users.
Remember, you are not being singled out because you are special. Rather, these criminals are targeting everyone they can, which happens to include you. No matter where you are (work, home or traveling), cyber criminals are there to get you and You are the Target, so please Think Before you Click. You are the first line of defence against any cyber attackers!
Protect Yourself
By following some simple steps you can protect yourself:
- Common sense is your best defence: if something seems odd, suspicious or too good to be true, it is most likely an attack.
- Keep your operating system and software up-to-date on all computers and mobile devices.
- Have a good password policy of creating strong, unique password for each of your accounts.
- Encrypt and password-protect any sensitive data before you email it.
- Never respond to a suspicious phishing email; if in doubt, report and delete.
- Be mindful of what you post online.
- Keep your mobile devices secure by enabling a PIN or passcode and only download apps from known sources such as Apple Store or Google Play Store.
What Should I Do?
If you are concerned you may have fallen victim to a cybercriminal, contact the IT Team.