Use the menus above to navigate by City Departments or Categories.
Use the menus above to navigate by City Departments or Categories.
You can also use the Search function below to find specific content on our site.
The rise of cyberthreats calls for greater awareness and education as it will enhance your ability to identify and defend against cybercrime. It is advisable to learn how to identify suspicious emails, links and messages so that you are less likely to be a victim of fraud. There are several ways to protect yourself from a cybercrime with some basic cybersmart skills.
The first layer of protection is having a secure password, threat actors use specialized tools for password cracking and gain control of an account due to the user's weak password. Brute force attacks use multiple combinations to crack passwords, strong passwords are essential preventing threat actors guessing the password.
MFA adds an additional layer of protection and verification beyond just a password to verify the user's identity for access. Even if a password or PIN is compromised from a cyberattack, MFA adds a second layer of verification. MFA has two or more authentication factors, the additional layer of security adds complexity for potential attackers, making it more difficult to gain access in an event of compromised credentials. MFA serves as a vital safeguard against cyber threats, including unauthorized access, data breaches and identity theft.
MFA usually employs a combination of two of these authentication factors:
Before clicking on any link or attachment, it is crucial to verify the source. Look carefully and check for any unfamiliar or suspicious email addresses, as phishing attempts often use deceitful techniques to trick users. Hover your mouse over the link and preview the URL destination. If the URL destination and senders' details look suspicious or do not match, it’s best to avoid clicking the link. Furthermore, be careful of unknown attachments from unknown sources, as they can possibly contain malware of harmful content. Be wary of urgent request for financial and personal details. Please refer here Social Engineering page for additional details on identifying different types of threats.
Often times our devices will prompt software updates at any given time. If an update is available, it is paramount to update your device. Each update typically includes patches for known vulnerabilities, potential bugs and strengthening your defense against potential cyber threats. Failure to update makes your device vulnerable to exploitations by malicious actors who actively target outdated software.
Simple ways of keeping devices and software up-to-date:
Can you spot the real or fake phishing email ?
Answer a series of questions to test your Cybersmart knowledge.
Play interactive games and defend your company.
Adventure packed online game providing key lessons on cyber literacy
ON THIS PAGE