Have some tips? Write it down and share it to your friends!
Click Login Now button to start!
Awareness
Cyber security related awareness
Phishing scams are everywhere. Always verify email signatures, especially for sensitive requests, to avoid fraud.
How to Verify Email Signatures:
- Check Authenticity: Look for official email addresses and...
November 19, 2024 16:25 (5 days, 18 hours ago) | 1 | QR Ready | 1 minute read
Fake job ads can install malware, leading to data theft.
Mitigation Steps:
- Verify Job Ads: Ensure they're from legitimate companies.
- Avoid Downloads: Don't download files from suspicious...
November 12, 2024 18:09 (1 week, 5 days ago) | 0 | QR Ready | 1 minute read
Video files can hide serious risks. Cybercriminals may embed malicious code or links, leading to harmful downloads or suspicious apps that compromise your device’s security.
Do's:
- Download from trusted sites.
- Scan files with antivirus...
November 5, 2024 16:35 (2 weeks, 5 days ago) | 0 | QR Ready | 1 minute read
Cookies are small data files stored by websites for monitoring, advertising, and personalization. If attackers gain access to your session cookie, they can impersonate you and access your private data.
To mitigate cookie risks:
- Clear...
October 16, 2024 17:36 (on 10/17/24) | 0 | QR Ready | 1 minute read
Are you an active social media user? While sharing life moments can be fun, be aware of the risks, especially regarding work-related information.
To protect yourself from hackers:
- Be cautious about what you share; avoid sensitive job...
October 8, 2024 18:34 (on 10/9/24) | 0 | QR Ready | 1 minute read
Phishing is a scam where attackers impersonate trustworthy entities to steal sensitive information.
Do's:
- Hover over links to check their destination; verify the sender's email for errors or odd domains.
- Evaluate the...
October 1, 2024 16:34 (on 10/1/24) | 0 | QR Ready | 1 minute read
Social engineering attacks manipulate individuals into revealing sensitive information or taking harmful actions. To protect yourself:
- Be Skeptical of Unsolicited Requests: Verify the sender's identity before responding to unexpected...
September 24, 2024 17:25 (on 9/25/24) | 0 | QR Ready | 1 minute read
Getting a new device is exciting, but securing and optimizing it is crucial. Follow these tips to set up and protect your device:
- Update Software: Ensure all software is up to date to fix vulnerabilities.
- Enable...
September 17, 2024 19:42 (on 9/18/24) | 0 | QR Ready | 1 minute read
When parting with old devices or data, secure disposal is vital to protect your information. Follow these tips:
- Destroy devices: Factory reset, then shred or drill hard drives and SSDs.
- Recycle responsibly: Use certified e-waste centers or...
September 11, 2024 17:18 (on 9/12/24) | 0 | QR Ready | 1 minute read
When using devices with personal data in public, follow these tips to stay secure:
- Use Secure Wi-Fi: Avoid public Wi-Fi for sensitive tasks; use a VPN instead.
- Disable Auto-Connect: Turn off auto-connect to...
September 3, 2024 17:39 (on 9/4/24) | 0 | QR Ready | 1 minute read