Cyber security

Common Threat Types

  • Phishing: most commonly using e-mails for the express purpose of obtaining personal information (such as passwords or credit card numbers) or manipulating others to perform unauthorized actions (such as bank transfers or purchases).
  • Malware: malicious software such as computer viruses, worms, Trojan horses, ransomware, key loggers and spyware.
  • Social Engineering: the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. This would include scareware.

Be Prepared

  • Education and Training (knowing is half the battle, see below)
  • Use Password managers
  • Use Multi-Factor Authentication (MFA) where possible
  • Use malware protection software
  • Follow Safe Computing Practices

Education/Training