Practice Good Cyber Hygiene

Practicing good basic cyber hygiene is one of the best, and easiest, ways people can protect themselves from cyber criminals and others that mean you harm.

Experts estimate that over 80% of cyber incidents could have been stopped if the targets had adopted good cyber hygiene practices. Adoption of basic and widely recognized cyber hygiene best practices can be one of the first and most important defenses people can employ to better protect themselves from ever-evolving and increasing cyber threats. This involves simple steps like adopting strong passwords, using multifactor authentication, updating devices when updates are issued, only downloading from official app stores, and avoiding untrusted links.

But according to a recent consumer survey commissioned by Trusted Future and conducted by the research firm AudienceNet, only about half of respondents take these recommended steps.

0%
Adopting 2-factor authentication
0%
Avoiding untrusted links
0%
Only downloading from official app stores
0%
Keeping software up to date
C4_Trusted Future_icons_seciruty

Lock Your Digital Doors

The hackers behind the intrusion into Colonial Pipeline’s IT systems, which led to panic buying at gas stations, were able to gain access to the company’s systems because one of Colonial’s employees reused a password from another account. Once that other account was compromised, hackers were able to identify the employee’s password in a batch of leaked passwords posted to the dark web.

Taking advantage of the surge in online deliveries during the pandemic, hackers sent text messages to millions of mobile phones prompting users to download a parcel tracking app, which was actually loaded with the “Flubot” malware. Because the app was not on the official Google Play Store, Android devices were only vulnerable if the user changed the default security settings to allow sideloading. Users who did not reverse the default setting of no sideloading stayed secure.

 

9

ESSENTIAL STEPS

TO KEEP YOUR DEVICE SECURE

9 ESSENTIAL STEPS

TO KEEP YOUR DEVICE SECURE

USE STRONG AND UNIQUE PASSWORDS FOR EACH ACCOUNT.
Use strong passwords or passphrases, don’t use the same password for multiple accounts, and pay attention to any notice from a legitimate source that your password and username have been found on the ‘dark-web’ and then change the password for that account. If you use the same password on multiple accounts and it becomes compromised, a criminal could try that password on your other accounts. Don’t make it easy for people looking to steal from you!
01
USE A PASSWORD MANAGER.
Password manager programs can help you create complex passwords for each of your accounts, remember those passwords, and even notify you if one of your passwords is found in a data leak.
02
USE MULTI-FACTOR AUTHENTICATION.
Multi-factor (often called two-factor) authentication can double your login protection by creating a second requirement to get access to your account. Even if your username and password are stolen, criminals won’t be able to access an account protected by two-factor authentication because the second factor (such as one sent to you via the SMS messaging function on your mobile device) would not be known to the criminal. It’s simple to use, turn it on!
03
AVOID INSECURE WEBSITES.
Only visit websites that use HTTPS (check the beginning of the website’s URL and look for the image of a lock) to protect your browsing from prying eyes – especially if using public Wi-Fi.
04
ONLY DOWNLOAD FROM OFFICIAL APP STORES.
Mobile malware is on the rise—a recent report from Nokia found an 80% increase in “banking malware” targeting smartphones in the first half of 2021. Mobile apps are the main way hackers distribute malware, ransomware, adware, and other malicious software. Official app stores, such as Android’s Google Play and Apple’s App Store, invest considerable resources into vetting apps to better protect you. Malicious apps are also regularly pulled from the two stores when they are discovered. Users that “sideload” apps from unofficial stores and third-party websites are much more likely to have their device infected by malware.
05
KEEP YOUR SOFTWARE UP TO DATE.
Always install official security updates from your device or software supplier. Criminals are constantly finding new ways to try to access your device or information, and technology companies are constantly updating your protections. A security update means your provider is plugging another hole—but you must install the update to get that protection! If offered, turn on the function that automatically updates your device.
06
RESPOND TO UNSOLICITED MESSAGES WITH CAUTION.
From the early days of the Internet, cybercriminals have used phishing and other “social engineering” tactics to trick victims into voluntarily disclosing account information and other private data or to load malicious software onto their devices. As we use our phones to do more things, and rely on them for more hours of the day, criminals have evolved too and are now using even more clever ways to trick us using text messaging and other communication services. Criminals may attempt to trick you with a personalized message, or use language and branding to make a message look “official,” for example from a government agency, company, or other trusted organization. Don’t be fooled by personalization, branding, or messaging that looks legitimate.
07
IF YOU ARE UNSURE, DON’T CLICK!
Phishing messages often use links disguised to look legitimate to deliver viruses, malware, and other malicious software. Look for suspicious attachments, poor grammar, and spoofed links. Sometimes it can be hard to determine whether an email is legitimate—when that happens the best approach is to contact the sender directly to confirm that the message is legitimate. If a message says it’s from a bank and asks you to click on a link, call the bank. If a delivery service asks you to confirm a delivery, go to the company’s website where you placed the order and confirm it from there. You can report spam or scam texts on the FTC’s website.
08
BEFORE YOU DOWNLOAD OR USE AN APP, DO SOME BASIC PRIVACY DUE DILIGENCE
Before you download an app or grant an app permission to access certain data, review the privacy label for the app in the app store to understand what data it collects and for what purposes. Make sure you are confident that you can trust the app to safely handle your data. Does it make sense for this app to access your microphone, contacts, and other parts of your phone? Asking these questions is now easier than ever, as official app stores are now mandating increased privacy disclosures by developers.
09
USE STRONG AND UNIQUE PASSWORDS FOR EACH ACCOUNT.
Use strong passwords or passphrases, don’t use the same password for multiple accounts, and pay attention to any notice from a legitimate source that your password and username have been found on the ‘dark-web’ and then change the password for that account. If you use the same password on multiple accounts and it becomes compromised, a criminal could try that password on your other accounts. Don’t make it easy for people looking to steal from you!
01
USE A PASSWORD MANAGER.
Password manager programs can help you create complex passwords for each of your accounts, remember those passwords, and even notify you if one of your passwords is found in a data leak.
02
USE MULTI-FACTOR AUTHENTICATION.
Multi-factor (often called two-factor) authentication can double your login protection by creating a second requirement to get access to your account. Even if your username and password are stolen, criminals won’t be able to access an account protected by two-factor authentication because the second factor (such as one sent to you via the SMS messaging function on your mobile device) would not be known to the criminal. It’s simple to use, turn it on!
03
AVOID INSECURE WEBSITES.
Only visit websites that use HTTPS (check the beginning of the website’s URL and look for the image of a lock) to protect your browsing from prying eyes – especially if using public Wi-Fi.
04
ONLY DOWNLOAD FROM OFFICIAL APP STORES.
Mobile malware is on the rise—a recent report from Nokia found an 80% increase in “banking malware” targeting smartphones in the first half of 2021. Mobile apps are the main way hackers distribute malware, ransomware, adware, and other malicious software. Official app stores, such as Android’s Google Play and Apple’s App Store, invest considerable resources into vetting apps to better protect you. Malicious apps are also regularly pulled from the two stores when they are discovered. Users that “sideload” apps from unofficial stores and third-party websites are much more likely to have their device infected by malware.
05
KEEP YOUR SOFTWARE UP TO DATE.
Always install official security updates from your device or software supplier. Criminals are constantly finding new ways to try to access your device or information, and technology companies are constantly updating your protections. A security update means your provider is plugging another hole—but you must install the update to get that protection! If offered, turn on the function that automatically updates your device.
06
RESPOND TO UNSOLICITED MESSAGES WITH CAUTION.
From the early days of the Internet, cybercriminals have used phishing and other “social engineering” tactics to trick victims into voluntarily disclosing account information and other private data or to load malicious software onto their devices. As we use our phones to do more things, and rely on them for more hours of the day, criminals have evolved too and are now using even more clever ways to trick us using text messaging and other communication services. Criminals may attempt to trick you with a personalized message, or use language and branding to make a message look “official,” for example from a government agency, company, or other trusted organization. Don’t be fooled by personalization, branding, or messaging that looks legitimate.
07
IF YOU ARE UNSURE, DON’T CLICK!
Phishing messages often use links disguised to look legitimate to deliver viruses, malware, and other malicious software. Look for suspicious attachments, poor grammar, and spoofed links. Sometimes it can be hard to determine whether an email is legitimate—when that happens the best approach is to contact the sender directly to confirm that the message is legitimate. If a message says it’s from a bank and asks you to click on a link, call the bank. If a delivery service asks you to confirm a delivery, go to the company’s website where you placed the order and confirm it from there. You can report spam or scam texts on the FTC’s website.
08
BEFORE YOU DOWNLOAD OR USE AN APP, DO SOME BASIC PRIVACY DUE DILIGENCE
Before you download an app or grant an app permission to access certain data, review the privacy label for the app in the app store to understand what data it collects and for what purposes. Make sure you are confident that you can trust the app to safely handle your data. Does it make sense for this app to access your microphone, contacts, and other parts of your phone? Asking these questions is now easier than ever, as official app stores are now mandating increased privacy disclosures by developers.
09

Trusted Resources for Further Reading

Securing Devices

U.S Department of Homeland Security

Candaian Centre for Cyber Security

Australia’s eSaftey Commissioner

New Zeland’s Computer Emergency Response Team

India’s Ministry of Electronics and Information Technology’s Computer Emergency Response Team (CERT-In)

Using Apps Safely

U.S. Federal Trade Commission

U.S. Cybersecurity & Infrastructure Security Agency

U.S. Military OneSource

Australia’s eSafety Commissioner

Social Engineering / Phishing Attacks

U.S. Cybersecurity & Infrastructure Security Agency

U.S. Federal Trade Commission

Canadian Centre for Cyber Security

Australia’s eSafety Commissioner

Useful Cyber Safety Tips

Download this Guide