click below
click below
Normal Size Small Size show me how
Cyber Security
Safety measures to protect yourself online.
| Term | Definition |
|---|---|
| Strong and Unique Passwords | Use strong passwords with a mix of upper and lower-case letters, numbers, and symbols. Avoid common words or phrases. |
| Two-Factor Authentication | Enable 2FA whenever possible for an extra layer of security. |
| Update Software | Keep your operating system, applications, and antivirus software up to date. |
| Beware of Phishing | Be cautious of emails, messages, or links from unknown sources asking for personal information. |
| Secure Wi-Fi | Set a strong password for your Wi-Fi network and use WPA3 encryption. |
| Public Wi-Fi | Avoid using public Wi-Fi for sensitive transactions unless you're using a Virtual Private Network (VPN). |
| Safe Browsing | Use secure and updated browsers. Look for HTTPS in the website's URL when shopping online. |
| Regular Backups | Regularly backup important data to an external source. |
| Secure Social Media Settings | Adjust your privacy settings on social media platforms to control what information is visible. |
| Email Safety | Don't open attachments or click on links from unknown sources. Verify the sender's legitimacy. |
| Software Sources | Download software only from reputable sources. |
| Use a Firewall | Enable the built-in firewall on your computer for an added layer of protection. |
| Avoid Oversharing | Be cautious about sharing personal information on social media or other public platforms. |
| Secure Mobile Devices | Use strong passwords or biometric authentication on your mobile devices. |
| Regular Updates | Keep your mobile device's operating system and apps updated. |
| App Permissions | Review and restrict app permissions to only what's necessary. |
| Offline Storage | Store sensitive data offline whenever possible. |
| Secure Online Shopping | Only shop from reputable and secure websites. Avoid saving payment details on websites. |
| Cyber Hygiene | Educate yourself about cybersecurity best practices and stay informed about current threats. |
| Log Out and Lock | Always log out of accounts after use and lock your device with a strong password or PIN. |
| Remember, cybersecurity is an ... | ...ongoing process. |