Views
1 year ago

3 Hand-outs

Hand-outs Leerjaar 3

5. Double check your

5. Double check your work. Breaches can easily occur due to simple miscommunication. For example, someone within a company thinks another person has changed the password – and vice versa. 6. Shred it. This goes for any paperwork you are no longer using at work and at home. 7. Use different passwords for different sites. For personal use, consider using a password tool that allows you to set different passwords for each site you frequent, while only requiring you to remember one strong password. 8. Beware of phishing scams. Unlike common spam, a phishing e-mail is after personal data and will likely have a sense of urgency, asking you to click here, act right away – the offer is time limited. Delete any e-mails that don’t sound right to you. 9. Avoid oversharing. The most common consumer threat today is social engineering in unexpected places like Facebook. Don’t answer questions on where you went to school, whether you have ever done something or what your nickname is. This information can be used to break into your accounts. 10. Consider turning Siri off – and Amazon Echo, Alexa and all the new devices that are listening and recording. You need to have a healthy suspicion of where this data is going. It might not be going where you think it is. c) Ultimately, we should all strive to be good net neighbours, protecting our own identity at work and at home. This means taking care of ourselves so we don’t get infected and harm others. The threat is real, but following the right security protocols can dramatically reduce our risks. For more information on how to stay safe in cyberspace, register for February’s FraudBuzz webinar. Source: https://blog.co-opfs.org/top-10-ways-prevent-cyber-crime-work-home/ CRIME & JUSTICE - CYBERCRIME

56 NAME: ______________________________________ DATE: _____________ CLASS: ______ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ _____________________________________________________________________________________ CRIME & JUSTICE - CYBERCRIME