Page 39 - Cyber Safety C-5
P. 39

Keeping Your Devices Safe from Phishing

                 Make  sure your  devices  are protected  with the
                 latest  security  updates  and  antivirus  software.  Be
                 cautious when downloading files or clicking on links,

                 especially from unknown sources. If you use public
                 Wi-Fi, avoid accessing sensitive accounts or entering
                 personal information unless you’re using a trusted
                 Virtual Private Network (VPN).



                                                       Monitoring Your Accounts Regularly

                                                       Regularly checking your bank accounts, credit cards
                                                       and online accounts for suspicious activity is a key
                                                       way to spot fraud early. If you notice any unfamiliar

                                                       transactions or changes, report them immediately.
                                                       Keep track of your spending  and monitor any
                                                       alerts or notifications from your bank or credit card
                                                       provider.



                 Educating Others About Phishing

                 Phishing attacks can affect anyone and one of the

                 best  ways to  protect  yourself and others is by
                 spreading awareness.  Educate friends,  family and

                 colleagues on how to recognise phishing emails and
                 messages.  Encourage  them  to  report  phishing
                 attempts  to  the  appropriate  authorities  or

                 organisations.


                                                      Verify Before Responding

                                                      When a suspicious  message  claims  to  be  from a
                                                      bank, senior colleague, vendor or government body,
                                                      avoid  responding  immediately.  Cybercriminals
                                                      often impersonate  trusted  sources  to create
                                                      urgency and pressure quick action. Instead of using
                                                      the phone number or link provided in the message,
                                                      independently check the official website for verified
                                                      contact details.





                                                                                         Phishing: Don't Get Hooked  37
   34   35   36   37   38   39   40   41   42   43   44