The Stedi Company Ltd
The Stedi Company Ltd

Online Safety

Below are some basic tips for staying safe online:

 

If it’s too good to be true, it probably is. Whether it is adverts offering free products, or a “new” website that has the best deals out there. The chances are you’ll never receive the product, but a stolen identity instead.

 

Look out for fake delivery confirmation emails. These typically contain malware and can compromise your computer. If you ordered online, it is best to go directly to the website you ordered from, obtain your tracking number there and then go to the appropriate delivery service website to track the package.

 

Social media sites have become a popular platform to target potential customers. Be on the lookout for fake adverts, coupons, or freebies offered. This goes for emails offering prizes or gift cards too! Not only will these “deals” result in hackers stealing your payment information, but also could include malware to infect your computer.

 

Avoid using public Wi Fi while making online purchases. This means, don’t do your online shopping while sipping your latte at the Coffee Shop. Get it to go, and shop from your sofa! Using public Wi Fi is not secure, leaving the door open to hackers.

 

Enable the firewall built into your laptop, even when using secured hotspots.

 

A personal firewall can protect your data against other hotspot users. If you are connecting via Wi Fi on a Windows computer, choose the "Public" option when asked what type of network you're on.

 

Disable file and printer sharing on your laptop before going out in public with it. Whatever data you allow to be shared on a network is available to other users of a wireless hotspot.

 

When you shop online, use a credit card. That way, if your information is stolen the cyber criminals are not tying up your personal funds from your current or savings account. In addition use just one credit card for the Internet and have one with a low limit.

 

If you suspect a mail READ it carefully, look for spelling mistakes and poor grammar. A mail can look good with all the right logos but the content can contain errors and this is always a clue to a spam mail.

 

You will not receive mails from your Bank asking for personal information, HMRC will not ask you for personal information by e-mail.

 

If in any doubt about a mail, do not open it but delete it from your inbox and then delete from the deleted box.

 

If you have to sign in to a site always sign out when you have finished.

 

Try these links for more information:

 

https://www.getsafeonline.org/

 

http://www.bullying.co.uk/cyberbullying/how-to-stay-safe-online/

 

http://www.safetynetkids.org.uk/personal-safety/staying-safe-online/

 

The advice to children in the links above aslo applies to adults.

 

 

Cyber security Tips

 

  1. Back up files – Backing up data is not a golden ticket when it comes to a malware attack, but it can certainly help.  Data backups should be stored on an external device, and unplugged from the primary device after the backup process is complete.  If backups are stored on the user’s device, they could also become infected if the device is hit with a virus, worm, or ransomware.
  2. Timely back up process – Users should evaluate the frequency of device use and determine a backup schedule that makes the most sense for them.  If they only use the device at home, and are rarely creating new documents, spreadsheets, or uploading new pictures, they may only need to backup weekly.  For larger users, backups could be necessary every hour.
  3. Keeping your operating system up to date – Updates are released to not only enhance the system, but also to patch security vulnerabilities.  If users do not update timely, they could be leaving their device vulnerable to hackers.  When updates are released, they typically include the vulnerabilities being patched.  This means cyber criminals are handed the vulnerabilities to exploit.  Again, if users do not update the system timely, they could be leaving the back door open for an attack.
  4. Timely updates of programs – The same concept applies for programs as it does for operating systems.  Timely updates are critical.  This includes all program updates on the device, including the security solution.
  5. Delete unused applications and programs – Often times users do not concern themselves with updating programs they are not using.  This leaves the device exposed to the threat of malware attacks.  Keeping unused programs on the device also takes up space on the hard drive, which is unnecessary if the program is not being utilized.
  6. Avoid default installation procedures – Often times the default, or express installation, of applications may include bloatware.  This includes various programs that are not needed for the exact application being installed.  By downloading bloatware, the device will not only slow down, but it could create issues with conflicting programs on the device or leave risks of malicious infections.
  7. Be mindful of your emails – Phishing attacks are on the rise.  These are emails with malicious attachments or links, claiming you need to click on them to view an invoice, shipping details, etc.  Often times, they look like they are from a legitimate sender.  Therefore, a proper review of the email is important.  Review the “Sent from” and “Reply to” address to confirm it is legitimate.  If the user is not expecting the email, contact the sender directly.  Do not reply to the email.
  8. Disable macros – Often times, if a user clicks on a malicious attachment, macros often need to be enabled for the infection to infiltrate the system.  Disabling macros can mitigate the risk of a malicious infection.
  9. Implement multi-level authentication – Using more than one method of authentication can divert security breaches.  Many websites are already doing this to increase users’ security.  However, users have the ability to “opt out”.  This is not encouraged.  Although it may take a bit more time to access the account, it is a significant boost in account security.
  10. Use application whitelisting – By implementing application whitelisting, or a default deny approach, only known trusted programs are allowed to execute on the device.  This significantly reduces the threat of a malware infection.

If you have any queries or wish to make an appointment, please contact us:

Mobile:  07817 868441

use our contact form

Please select your language below

You have installed an adblocker. This Web App can only be displayed and edited correctly when the adblocker is disabled.
Print Print | Sitemap Recommend this page Recommend this page
© The Stedi Company Ltd 2016