I. General Guidelines
• Protect your devices: Always install antimalware software on all your devices, including laptops, smartphones, and tablets. This is one of the simplest and most effective ways to defend against viruses and other malicious software.
• Be cautious with email: Avoid opening email attachments, especially from unknown senders or if the email seems unusual. These files can contain malware, such as viruses or spyware, designed to infect your device and compromise your personal information.
• Avoid unknown messages: Don't respond to messages on social media, SMS, or apps like WhatsApp from people you don't know. These messages often contain links with malware. The best practice is to simply delete or block the sender.
• Scan removable media: Before using any removable media like flash drives, external hard drives, or CDs, always scan them for viruses or malware. This crucial step can prevent your system from becoming infected and protect your data.
• Use strong, unique passwords: Creating strong and unique passwords is one of the most effective ways to protect your online accounts. Use a minimum of 12 characters, including a mix of uppercase and lowercase letters, numbers, and special characters. Never reuse the same password across multiple accounts.
• Protect your passwords: Treat your passwords as confidential information. Disregard any SMS or emails requiring to share your OTP, PIN, Passwords or card info if not expected or initiated by you. Always question the validity of the request. Don't write them down in plain text on your computer, in your phone's notes, or on physical sticky notes. Instead, memorize them or use a reputable password manager application.
• Enable Two-Factor Authentication (2FA): To protect your personal information, enable 2FA on all your online accounts, including messaging apps, social media, and any other internet services. This adds a critical layer of security and is highly effective at preventing unauthorized access.
Recognizing and avoiding phishing scams
Be extremely cautious of emails or phone calls that impersonate trusted organizations, like your bank or a company you do business with. These fraudulent emails or phone calls are designed to trick you into revealing sensitive information.
Scammers often create a false sense of urgency or fear using common themes:
• Claiming an issue with your account: They may state your account is locked, your password needs to be changed, or that your personal information is incomplete.
• Threatening negative consequences: The email might warn that your account will be suspended or closed if you don't take immediate action.
• Offering a false reward: You might be told you've won a lottery, received a transfer, or are eligible for a special payment.
• Requesting a payment or financial information: The email may claim you need to provide credit card details to receive a payment or complete a transaction.
Crucial rule: Legitimate companies and your bank will never send you an email or call asking you to provide personal information, passwords, OTPs, or PIN codes through an email link.
How to Protect Yourself
• Don't click links or open attachments: Never click a link within a suspicious email. Instead, manually type the company's official website address into your browser and log in directly.
• Verify the sender: Phishing emails often use a fake or slightly misspelled sender address.
• Look for red flags: Be suspicious of poor grammar, spelling errors, or a generic greeting like "Dear Customer."
• Contact the company directly: If in doubt, use a phone number or email address from the company's official website to contact them. Do not use any contact information provided in the suspicious email.
• Use bookmarks for sensitive sites: To access sensitive websites, like your bank, always manually type the correct website address into your browser's address bar or use a trusted bookmark.
• Protect your financial information: Never save your passwords or credit card numbers in unknown apps or on unfamiliar websites. Instead, use only trusted and reputable services for storing this data.
II. Guidelines to keep your mobile/tablet devices safe
• Only install apps from official stores: Do not install applications unless they are from official stores like the Apple App Store or the Google Play Store.
• Keep your devices up to date: Always install software updates on your devices and apps. These updates often contain critical security fixes that protect you from hackers.
• Use personal devices for sensitive information: Always use your personal devices to access sensitive information like business emails or your e-banking platform. Never access these services from public computers in places like coffee shops or hotels.
• Avoid public Wi-Fi for sensitive activities: Avoid using public Wi-Fi networks in places like coffee shops, hotels, or airports for sensitive activities. These networks are often unsecured and can expose your data. Use a trusted network like your home or office Wi-Fi, or your cellular data (4G/5G).