01 Oct Cybersecurity Awareness Month 2021
As a Private and Corporate Investigation Agency in Cambodia, we regularly receive reports and inquiries concerning breaches of cyber security. These range from passive attempts to more assertive and direct attacks. Direct attacks are similar to the method’s used by scammers. These attackers will try and extract important information which they will then use to seemingly legitimize their actions. With technology being being at our fingertips and part of nearly every aspect of our lives, it only makes sense to guard our information as closely as we would any other asset.
Lead Investigations, together with other members of the STOP.THINK.CONNECT partner’s campaign, are in full support of Cybersecurity Awareness Month.
At a time when we are connected more than ever, being “cyber savvy” is incredibly important. Recently, the world has seen it’s fair share of attacks and breaches. This includes the SolarWinds and Kaseya breaches as well as high-profile attacks on the Colonial Pipeline in the US, and other critical infrastructure. Cyber attacks are clearly becoming more advanced, with more evolved versions cropping up almost daily. There are numerous steps that we can make out of our daily routine in order to mitigate risks. Lets take a look at some of them:
Enable MFA
Multi-factor authentication (MFA) adds that necessary second check to verify your identity when logging in to one of your accounts. By requiring multiple methods of authentication, your account is further protected from being compromised. MFAs make it difficult for password cracking tools to enable attackers to break into accounts.
Always use strong passphrases/passwords
Yes, this does seem obvious, but it is often overlooked. Of course, it might seem bothersome to always think of new passwords, especially ones that are complicated and comprise of different symbols etc., but it is well worth the effort. People spending more time online during the pandemic has certainly contributed to more bad actors prowling for accounts to gain entry to. Using long, complex, and “once off” passwords is a good way to stop your account from being hacked, and an easy way of keeping track and remembering your passwords is by using a password manager.
Perform software updates
It happens all the time- your device prompts you to update software. We are all tempted to simply click “postpone” or “Remind me later”, or simply ignore the message. Nevertheless, having the latest security software, web browser or operating system on your devices is one of the best and easiest methods to combat online threats. This is your first line of defense for your device! “Don’t wait, Update!”
Do your research
Maintaining good online hygiene, and an intuitive step to stay safe online is to do some research before downloading anything new to your device, such as apps. Before downloading any new learning app on your device, platforms such as Google’s Play Store and iPhone’s App Store can tell you who is the creator of the app, make sure they are listed as trustworthy. What is even easier to do is see what user reviews have to say. Sometimes even a quick google search of the app’s name may reveal if they are trustworthy or not.
Check your settings
Be diligent to double check your privacy and cyber security settings, and be aware who can access your documents. This extends from Google docs, to Zoom calls, and beyond. For example, create passwords so only those invited to the session can attend.
—
Being cyber smart and maintaining stellar online hygiene is the best way to protect yourself and others from cyber attacks. No single tip is foolproof, but taken together they can make a real difference for taking control of your online presence. Following these tips is also easy, and free. By taking preventive measures and making a habit of practicing online safety, you can decrease your odds of being hacked exponentially. If you require any assistance or would like to seek advice regarding your cyber security, contact Lead Investigations Cambodia.
To read more on the topic, see here.