Cyber Aware

Are You Cyber Aware?

You are the Human Firewall

Protect yourself and your company from the risk of a cyber-attack by understanding common cyber security threats and knowing how you should respond to them.

 

Phishing and its variants are part of a larger group of social engineering exploits.

IT-driven solutions cannot fully protect against social engineering because they encourage humans to do things that are against good cyber security policy.

Phishing

What is it?

Like fishing, but you are the fish. Attackers use emails as bait to get you to click links and open attachments that install damaging malware.

Remember

Be certain before you open or click. If you are unsure, ask a member of your company’s IT department or provider to qualify the link.

How to Spot It

  • It appears urgent
  • It looks official – check the email address is right
  • The message begis and/or ends with a generic greeting
  • It asks for personal information – such as mobile numbers, home address, etc
  • Layout, design and language might not ‘feel’ right

Vishing

What is it?

Like phishing, but attackers try to get you to click links, open files or tell them personal information over the phone.

Remember

Verify any suspicious calls by checking information with a second source.

How to Spot It

  • You have never spoken to the person before
  • They called you, you didn’t call them
  • Their call demands an urgent response
  • Their story is that a process has failed and that their request is routine/not a big deal
  • They claim to be a colleague or work for a company that is important – eg the bank, delivery provider, customer, family member

Smishing

What is it?

Like phishing, but over SMS.

Remember

Don’t click SMS links! And do not reply as sometimes its to exploit a premium rate service.

How to Spot It

  • You have never received messages from this number before
  • You don’t recognise the number (if shown)
  • It uses the name of a well-known brand – en An Post, AIB
  • It contains a link and ask you to use it

Do You Have Cyber Security Concerns?

The Dos and Don'ts

The Dos

  • Change passwords regularly
  • Use strong passcodes on all mobile devices
  • Keep web browsers and anti-virus patched
  • Verify suspicious incidents with secondary sources
  • Scrutinise all URLs
  • Report incidents to the IT team immediately
  • Educate yourself and those around you
  • Be sceptical and vigilant

 

The Don'ts

  • Reuse passwords or use obvious phrases
  • Volunteer information to strangers
  • Click on unsolicited email attachments and embedded links
  • Bypass mobile device encryption
  • Plug unknown USB drives into your computer
  • Fear getting in trouble for reporting issues
  • Assume that you will not be attacked

Top Tips

  • Change passwords regularly
  • Don’t use the same passwords across multiple systems
  • Avoid names, places and colours
  • The best passwords can’t be found in a dictionary

Mitigate Risk with Leading Security Solutions