Online Cybersecurity Advice for all digital citizens

January 18, 2018

Lock down your login. Your usernames and passwords are not enough to protect key accounts like email, banking and social media. Strengthen online accounts and use strong authentication tools – like biometrics, security keys or a unique, one-time code through an app on your mobile device – whenever offered. Keep a clean machine. Keep all software on internet-connected devices – including personal computers, smartphones and tablets – current to reduce risk of infection from ransomware and malware. When in doubt, throw it out. Links in email, tweets, posts and online advertising are often how cybercriminals try to compromise your information. If it looks suspicious, even if you know the source, it’s best to delete or, if appropriate, mark it as junk. Back it up. Protect your valuable work, music, photos and other digital information by making an electronic copy and storing it safely. If you have a copy of your data and your device falls victim to ransomware or other cyber threats, you will be able to restore the data from a backup.

Spotlight

Recon InfoSec

Information Security is who we are and all we do. Our team is unique. We are the believers that volunteer and run CTFs at BSides, DEF CON, and other security conferences. We are infosec specialists with a broad spectrum of complementary skills. We are developers, security analysts, and forensic investigators.

Other Infographics
news image

Social Engineering Attack Facts

Infographic | April 4, 2022

Social engineering attacks exploit human error to access credentials or spread malware using infected email attachments or links to malicious websites.43% of IT experts report that they have been victims of social engineering.

Read More
news image

Artificial Intelligence in Cybersecurity

Infographic | April 4, 2022

Artificial intelligence endeavours to simulate human intelligence. It has immense potential in cybersecurity.

Read More
news image

Alarming Cyber Security Stats to Know for 2022 & Beyond

Infographic | June 7, 2022

The best way to achieve security is to implement proper controls in place, train well on cyber-security, and follow the recommended best practices.

Read More
news image

Effects of Virtualization Security Risks in Businesses

Infographic | February 19, 2022

Virtualization as a concept is experiencing more utility in recent times due to its ability to offer improved efficiency and scalability while reducing costs. Over 90% of businesses use server virtualization, and more organizations have begun exploring other types of virtualization, including desktop, application, and storage virtualization.

Read More
news image

Privileged Access Management (PAM)

Infographic | April 4, 2022

Privileged access management (PAM) controls, monitors, secures and audits all human and non-human identities and activities across an enterprise IT environment.3% of organizations lack a mature approach to access management, resulting in two times more breaches.

Read More
news image

10 Tips to Protect Your Data

Infographic | July 30, 2021

When making an online purchase, or creating an account online, it is tempting to save banking details and passwords for the sake of convenience. But a data leak from even one of these sources could cost you.

Read More

Spotlight

Recon InfoSec

Information Security is who we are and all we do. Our team is unique. We are the believers that volunteer and run CTFs at BSides, DEF CON, and other security conferences. We are infosec specialists with a broad spectrum of complementary skills. We are developers, security analysts, and forensic investigators.

Events