MOST COMMON THREATS

Network Vulnerabilities

Is a weakness or flaw in the network infrastructure or organizational processes, that can result in a security breach when compromised by a threat.

Software Exploits

These vulnerabilities can exist hidden in the code of the operating system and its applications could be used by cybercriminals to gain illicit access to your system.

Phishing Attacks

Is by far the most common type of cyber attacks, where hackers impersonate a legitimate company or individual in an attempt to steal their personal data, financial information and login credentials.

Cyber Security Recommendations

Keep software up-to-date

Installing software updates for your operating system and programs is critical.

Always install the latest security updates for your devices.

Good Password Practices

We all have too many passwords to manage and it’s easy to take short-cuts, like reusing the same password.

A password manager can help you to maintain strong unique passwords for all of your accounts. These programs can generate strong passwords for you, enter credentials automatically, and remind you to update your passwords periodically.

Avoid Phishing Scams

Phishing scams can be carried out by phone, text, or through social networking sites. But most commonly by email.

Be suspicious of any official looking email message or phone call that asks for personal or financial information.

Be Careful what you click

Avoid visiting unknown websites or downloading software from untrusted sources. These sites often host malware that will automatically install (often silently) and compromise your computer.

If attachments or links in the email are unexpected or suspicious for any reason, don’t click on it.

Never leave devices unattended

The physical security of your devices is just as important as their technical security.

If you need to leave your laptop, phone, or tablet for any length of time. Lock it up so no one else can use it.

For desktop computers, lock your screen or shut-down the system when not in use.

If you keep sensitive data on a flash drive or external hard drive, make sure they are encrypted and locked up as well.

Backup your Data

Back up your data regularly.

If you are a victim of a security incident, the only guaranteed way to repair your computer is to re-install the system from your backups.