Logo  
october 2022
 

Cybersecurity Awareness | 8 habits to have at Home and at Work

In Cyber Security Awareness month we remind you here of habits to stay safe in cyberspace, both at home and at work. These eight tips help you recognise and combat digital security threats and be less vulnerable to cyber-attacks.

Intro10
 
 

1. Think twice before clicking on links or opening attachments

Image37

Even if an email appears to be from someone you know, be wary of attachments. Be aware of the way the email is written, the logos it contains, if it is addressed as being from a company, as well as the sender's email address. Do not reply to the email because the sender's identity may have been compromised.

 
 

2. Check private information requests

Image18

Whenever you are asked to provide private information (yours or anyone else's), verify the identity of the requester, even if it appears to be from someone you know. Cyber criminals are dedicated to creating creative and underhand ways to trick victims into collecting information to steal and harm victims.

 
 

3. Protect your passwords

Image46

Never reveal your passwords to anyone. Make them long, strong, unique and use multi-factor authentication (MFA) wherever possible.

  • Use a password manager.
  • Use different passwords for different accounts.
  • Use different passwords for work and home.
  • Don't allow apps and websites to save your passwords.
 
 

4. Protect your assets!

Image25

When in public places be vigilant. Do not leave your devices with access to personal and/or work information unattended. When accessing sensitive information confirm that there is no possibility of direct access or viewing of device screens. When at work, secure your area and lock your computer screen before leaving your desk. Take your mobile phone and other portable items with you.

 
 

5. Keep devices, browsers and applications up to date

Image30

At home, automate software updates and periodically reboot your devices to ensure updates are fully installed. Be aware of requests for updates from your employer's IT team and comply as soon as possible.

 
 

6. Back up critical files

Image10

Store backups in a location physically separate from the originals and test them periodically. For critical work files, use storage options approved by your employer. For personal files, save a backup to a separate drive (for example, cloud or encrypted USB) for safe storage.

 
 

7. Delete confidential information when it is no longer required

Image2

Confirm with your employer what are the procedures for the storage and destruction of critical documents. At home, review what information you have stored and whether it is still valid or should be deleted.

 
 

8. If you are suspicious, report it!

Image29

Learn how to recognise suspicious fraud and other suspicious activity. At work, check procedures and act immediately. At home, report any emails you receive to the relevant authorities and judicial authorities. Also inform your family and friends!

 

SUBSCRIBE OUR NEWSLETTER


Cookie Consent X

Integrity S.A. uses cookies for analytical and more personalized information presentation purposes, based on your browsing habits and profile. For more detailed information, see our Cookie Policy.