Be Cybersmart!

The rise of cyberthreats calls for greater awareness and education as it will enhance your ability to identify and defend against cybercrime. It is advisable to learn how to identify suspicious emails, links and messages so that you are less likely to be a victim of fraud. There are several ways to protect yourself from a cybercrime with some basic cybersmart skills.

An image of a hand pointing its index finger towards the screen open_in_full

Use Strong Passwords

The first layer of protection is having a secure password, threat actors use specialized tools for password cracking and gain control of an account due to the user's weak password. Brute force attacks use multiple combinations to crack passwords, strong passwords are essential preventing threat actors guessing the password.

  • Create complex passwords with a mix upper and lower case of letters, numbers and symbols, and avoid using the same password. Consider using passphrase which is sequence of words or sentences and never share your password or store the password in a place where it’s easily accessible. It’s generally longer and easier to remember.  For example: Cybersafe_Sacramento_Is_#1!
  • Consider using a password manager, a tool designed to securely store and mange passwords for various online accounts. Instead of memorizing passwords for multiple accounts, a password manger enables you to create strong and unique passwords for each account that is securely stored in an encrypted vault.

Setup Multi-factor Authentication (MFA)

MFA adds an additional layer of protection and verification beyond just a password to verify the user's identity for access. Even if a password or PIN is compromised from a cyberattack, MFA adds a second layer of verification. MFA has two or more authentication factors, the additional layer of security adds complexity for potential attackers, making it more difficult to gain access in an event of compromised credentials. MFA serves as a vital safeguard against cyber threats, including unauthorized access, data breaches and identity theft.

MFA usually employs a combination of two of these authentication factors:

  • Knowledge-based factors: Information the user already knows, passwords, PINs, or security questions. 
  • Possession-based factors: Things the user possess, smartphone or hardware token (e.g. authenticator apps or OTP code). 
  • Biometric-based factors: Unique physical attributes of the user, such as fingerprints or facial features. 
  • Location/Time-based factors: Involves verifying the user’s location/time through GPS or IP address to ensure the user is accessing from the expected location.

Check Before You Wreck

Before clicking on any link or attachment, it is crucial to verify the source. Look carefully and check for any unfamiliar or suspicious email addresses, as phishing attempts often use deceitful techniques to trick users. Hover your mouse over the link and preview the URL destination. If the URL destination and senders' details look suspicious or do not match, it’s best to avoid clicking the link. Furthermore, be careful of unknown attachments from unknown sources, as they can possibly contain malware of harmful content. Be wary of urgent request for financial and personal details. Please refer here Social Engineering page for additional details on identifying different types of threats.

Keep Software Up-to-Date

Often times our devices will prompt software updates at any given time. If an update is available, it is paramount to update your device. Each update typically includes patches for known vulnerabilities, potential bugs and strengthening your defense against potential cyber threats. Failure to update makes your device vulnerable to exploitations by malicious actors who actively target outdated software.

Simple ways of keeping devices and software up-to-date:

  • Enable automatic updates: most devices and software applications provide an option to automatically install the most recent updates.
  • Do not ignore updates: even if they seem insignificant, postponing updates can lead to potential cyberattacks.
  • Stay informed: just like any news, it is also important to be informed about the cyberworld as our day-to-day lives involve being online more and more.  Informing yourself about the latest cybersecurity threats can prevent you from becoming a victim.  

ON THIS PAGE