The National KE-CIRT/CC

Tel Hotlines: +254-703-042700, +254-730-172700
incidents@ke-cirt.go.ke

Cyber Security General Tip

Cyber Security General Tip

Internet is woven into the fabric of our daily lives and the world is more interconnected today than ever before. We enjoy the benefits and convenience that the Internet provides as we shop from home, bank online using our smart phones and interact with friends from around the world through social networks.

Cyber Security General Tip

  • Never leave your devices unattended. If you need to leave your computer, phone, or tablet for any length of time no matter how short lock it up so no one can use it while you’re gone. If you keep sensitive information on a flash drive or external hard drive, make sure to lock it up as well.
  • Always be careful when clicking on attachments or links in email. If it’s unexpected or suspicious for any reason, don’t click on it. Double check the website the link takes you to by pointing your mouse cursor at it: bad actors will often take advantage of spelling mistakes to direct you to a harmful website.
  • Sensitive browsing, such as banking or shopping, should only be done on a device that belongs to you and on a network that you trust. Whether it’s a friend’s phone, a public computer, or a cafe’s free WiFi – your data could be copied or stolen.
  •  Be conscientious of what you connect/ plug in to your computer. Malware (Malware is any kind of unwanted software that is installed without your adequate consent. Viruses, worms, and Trojan horses are examples of malicious software that are often grouped together and referred to as malware.) can be spread through an infected email link, attachments, flash drives,   external hard drives, and even smartphones.
  • Watch what you’re sharing on social networks(for more information refer to http://www.cck.go.ke/industry/information_security/ke-cirt-cc/Social_networking.html).
  • Offline, be wary of social engineering, where someone attempts to gain information from you through manipulation. If someone calls or emails you asking for sensitive information, it’s okay to say no. You can always call the company directly to verify credentials before giving out any information.
  • Practice good password management. Use a strong mix of characters, and don’t use the same password for multiple sites. Don’t share your password with others, don’t write it down, and definitely don’t write it on a post-it note attached to your monitor. For more information refer to http://www.cck.go.ke/industry/information_security/ke-cirt-cc/Chosing_password.html
  •  Be sure to monitor your accounts for any suspicious activity. If you see something unfamiliar, it could be a sign that you’ve been compromised.
  • Realize that you are an attractive target to hackers (A hacker is a person who seek to exploit weaknesses in software and computer systems for his/her own gain. Although his/her intention is sometimes fairly benign and motivated solely by curiosity, his/her actions are typically in violation of the intended use of the systems he/she is exploiting. The results can range from mere mischief -creating a virus with no intentionally negative impact- to malicious activity (stealing or altering information). Don’t ever say “It won’t happen to me.”

For more information on security Tips, Please visit the National KE-CIRT/CC Security Library.

Powered by ITU/IMPACT

UN ITU ITU IMPACT