Five practical ways to make yourself cybersafe

Alternate format: Five practical ways to make yourself cybersafe (PDF, 428 KB)

Canadians are targets of cybercrime in many different forms. Here are five practical measures you can take right now on any device to protect yourself against cyber-security breaches. Visit www.cyber.gc.ca for more on any of these steps.

 

PRACTICE GOOD PASSWORD ETIQUETTE

Use unique passphrases and complex passwords.

Don’t share passwords. Don’t use the same password for multiple accounts, websites or devices.

Use two-factor authentication Two-factor authenticationA type of multi-factor authentication used to confirm the identity of a user. Authentication is validated by using a combination of two different factors including: something you know (e.g. a password), something you have (e.g. a physical token), or something you are (a biometric). (2FA) when available.

 

SECURE YOUR SOCIAL MEDIA AND EMAIL ACCOUNTS

Use as many security options (settings) as you can for each social media and email platform.

Do not use your social media to log into other web accounts (e.g. shopping, banking, social media or other personal accounts).

 

STORE YOUR DATA SECURELY AND KNOW YOUR BACK-UP PROCEDURES

Use only new USB memory sticks purchased by you or someone you know. Do not use USB sticks on untrusted computers.

Secure data stored in the cloud or online by turning on the available security features.

Back up your vital personal information and know where you have it backed up.

Practice recovering your data at least once. This way you’ll know what to do if you become a ransomware RansomwareA type of malware that denies a user's access to a system or data until a sum of money is paid. victim.

APPLY UPDATES TO YOUR MOBILE DEVICES, COMPUTERS, AND APPLICATIONS

Those updates are crucial to your security: they contain what we call security “patches.” Don’t ignore them.

Be sure to apply updates to your mobile applications in addition to your device operating systems and get them to automatically update.

 

BE ON GUARD FOR PHISHING AND SPEAR-PHISHING MESSAGES

Know how to spot phishing PhishingAn attempt by a third party to solicit confidential information from an individual, group, or organization by mimicking or spoofing a specific, usually well-known brand, usually for financial gain. Phishers attempt to trick users into disclosing personal data, such as credit card numbers, online banking credentials, and other sensitive information, which they may then use to commit fraudulent acts. and spear-phishing messages.

Be wary of suspicious links – don’t click on them.

Use anti-virus VirusA computer program that can spread by making copies of itself. Computer viruses spread from one computer to another, usually without the knowledge of the user. Viruses can have harmful effects, ranging from displaying irritating messages to stealing data or giving other users control over the infected computer. or anti-malware MalwareMalicious software designed to infiltrate or damage a computer system, without the owner's consent. Common forms of malware include computer viruses, worms, Trojans, spyware, and adware. software on computers.

 

Date modified: