Cibersecurity Newsletter
SEPTEMBER 2020

Uso apropriado da Internet

Did you know… careless habits when using the Internet may put you, your organization, and other users at risk of cyberattacks?

With only one click, it’s possible to find:

Check

Your profiles on social media and access freely to your photos or contents that can be used in attacks directed to you?

Check

Posts that you wrote concerning sensitive or controversial topics that can harm your image?

Check

Sensitive personal information about you or your relatives that can be used for fraudulent purposes, such as blackmail, identity theft, and the like?

So, you are vulnerable to virtual dangers! Warning

Know how to proceed to keep safe in the online world:

1. Pay attention to your posts and limit access to sensitive information

Check

Avoid making online posts that can harm your image or your organization's

Check

Reflect before posting. Even if you delete the original content, remember that copies that were made will not be deleted from third-party devices, which brings some risks

Check

Limit the volume of sensitive information you provide online. Keep data such as marital status, address, and telephone, private

Check

Turn on your browser and social media’s privacy configurations, therefore decreasing the volume of information you provide online

Image24

2. Security first

Check

Practice secure browsing and try not to access doubtful content. Remember that one careless click can expose sensitive data or infect devices with malware

Check

Make sure you use a secure Internet connection by avoiding public Wi-Fi networks and using a VPN (Virtual Private Network) provided by your organization for performing work tasks in a secure way

Check

Choose a security software that has real-time protection programs and keep it up to date

Check

Use robust passwords, according to the effective security policy of your organization (learn how in point 1)

Image11

3. Be careful with the pages that you visit, what you download, and who you talk to online

Check

Always use websites with secure, encrypted connections for searching or shopping

Check

Do not access links or download documents or apps that are considered suspicious or come from websites that are not trustworthy

Check

Pay attention to the people you talk to online. Attackers often create fake profiles to access sensitive personal and professional information

Image2

Archive

2024

2023

2022

2021

2020

2019

Subscribe our newsletter.


Cookie Consent X

Devoteam Cyber Trust S.A. uses cookies for analytical and more personalized information presentation purposes, based on your browsing habits and profile. For more detailed information, see our Cookie Policy.