Cyber Security Awareness Month: Computer week

CSAM_1200x628-fb-in_week3_computer.jpg

During the third week of Cyber Security Awareness Month, we shine a spotlight on the computer and offer tips about how to keep this important device safe and secure. With many NC students and employees learning and working from home during the COVID-19 pandemic, the health and security of our computers is more important than ever.

To function properly and keep you safe, these devices need to be cared for. This week, consider reading up on the following cybersecurity tips:

Create complex passphrases

A strong password is important and protects you from cyber criminals. Here are five ways to know if you have a strong password:

  1. You aren’t using the name of a pet or family member;
  2. You’re using a passphrase instead of a password;
  3. Your password is unique to the account/device you are using;
  4. You’re using one of Get Cyber Safe’s strong password tricks;
  5. You haven’t shared your password with anyone.

Prevent against malware

Malware, or malicious software, is a common method that cyber criminals use to infect systems and devices and steal information from victims.

To protect yourself from malware:

  • Install and use anti-malware software. If you use a College-issued device, SOPHOS Endpoint Agent provides protection, while there are many paid and free solutions available for personal devices. Be sure the anti-malware software comes from a reputable source (direct from a reputable developer is best) and keep the software up-to-date;
  • Beware of downloads;
  • Spot the signs of malware being on your computer.

Avoid phishing scams

Phishing is a common tactic that cyber criminals use to steal personal and financial information from you. Phishing messages usually take the form of an email or phone call from a cyber criminal who is pretending to be someone they are not, such as your bank.

Protect yourself and your device by learning the seven red flags of phishing:

  1. Urgent or threatening language;
  2. Requests for sensitive information;
  3. Anything too good to be true;
  4. Unexpected emails;
  5. Information mismatches;
  6. Suspicious attachments;
  7. Unprofessional design.

Information and images from getcybersafe.gc.ca.

Share this article

PinIt