We at Trinity are concerned about your cybersecurity. In order to help you ensure that your browsing experience is safe, the following are some tips.
First, you need to make sure that your infrastructure is hard to infiltrate. The following are a few techniques to accomplish this.
- Layer your network security
This can be done by using tools that will make it hard for attackers to enter into your system. This involves using firewall, anti-virus and anti-malware software, and security patches.
- Control information access
Limit the people and employees who have access to sensitive information such as client data and financial records. Identify what positions or job functions need to interact with these documents and implement guidelines so as to avoid abuse and negligence.
- Stay on top of all security updates
However, downloading and installing security updates might be the least priority of users especially when they are busy with work, so one way to ensure that computers are all updated is to set the security updating as automatic.
Second, you need to ensure that you know practices to safeguard yourself against these cyber-attacks. The following are a few of these:
- Avoid opening emails from unknown sources
But this is easily said than done. Most of the time, the email sender will appear to be legitimate and the subject line very catchy, so it might be hard to distinguish which is fake and which is not. However, if the email is unsolicited, think twice before opening it.
- Avoid clicking links immediately
One way to know if a link is legitimate is to hover your cursor on top of it (make sure NOT to click it yet) to see the full address. In this way, you will know if the link provided is the real thing. However, this is applicable only in emails.
- Validate the information you receive by visiting official websites or calling official contact numbers
This might mean extra effort on your end, but this will help you determine if the person behind the email or text is legitimate.
- Keep yourself updated of the latest in cybersecurity and recent attacks
Black-hat hackers and attackers are constantly evolving their strategies, so you must also be aware of the latest in news especially about cybercrime.
- Report any suspicious communication
Get in touch with the authority assigned on cybersecurity (usually IT administrators in company settings) if you encountered any malicious or suspicious communication. In this way, you have helped not only yourself but also others who might not be aware of these kinds of tactics.
But even though you have already implemented measures to safeguard yourself, there may still be loopholes that black-hat hackers and attackers may take advantage of, so you should also know how to react just in case you think that you’ve fallen victim to a cyber-attack. The following are a few tips:
- Report to the concerned authority for proper guidance
Immediately report the incident to the concerned authority (usually IT administrators in company settings) if you opened a suspicious email or clicked an illegitimate link. Remember that attackers are moving fast, so reporting the incident as early as possible will be beneficial.
- Change your password
If your account hasn’t been compromised yet, changing your password might help you prevent the attacker from further access to your information. However, this doesn’t necessarily mean that no harm has been done, so it is still better to report the incident to the concerned authority.
- Run an antivirus/anti-malware scan on your computer
Attackers might have installed a malware on your device, so running an antivirus/anti-malware scan will help you identify if there is such. But just to set expectations, security software may not be able to detect all malwares especially the newer ones. This is why layered network security is essential.
- Regarding bank transactions, report to your bank as soon as possible
Make sure that you have the contact number of your bank, so that when there is an emergency such as cyber-attack to your account, you can immediately give your bank a call.
- https://www.facebook.com/DICTgovph • https://www.nisc.go.jp/security-site/eng/campaign/handbook_ENG.html • https://www.ncsc.gov.uk/guidance/suspicious-email-actions • https://www.ncsc.gov.uk/guidance/phishing