Whether we realise it or not, much of our lives are operating in the cyber space where all our personal data are stored.

Although you may not consider your communications as "top secret," you probably do not want strangers reading your email, using your computer to attack other systems, sending fake email from your computer, or examining personal information stored in your computer.

Hackers want to gain control of your computer so that they can use it together with other computers under their control to launch attacks on other computer systems. Having control of your computer will enable them to hide their true location as they launch the attacks, often against high-profile computer systems such as government or financial systems.

Signs of an infected computer:

  • Pop-ups and messages that indicate your computer is infected with a virus and needs protection. Don’t click on the pop-up alerts or the cross to close the alert as this may result in more pop-ups. Instead, hit CONTROL + ALT + DELETE buttons to view a list of programs currently running and delete the alert from the list.
  • Your computer or internet browser is running extremely slow, or it is unable to connect to the internet.
  • Once connected to the internet, all types of windows open on their own or the browser displays pages and applications that have not been permitted or requested.
  • Missing files and disabled computer security systems.
  • The computer is speaking a strange language. The language of certain applications changes, the screen appears back-to-front, or strange insects start ‘eating’ the desktop.
  • Applications on the desktop or start menu don’t launch or a different program might launch instead.
  • Running out of hard drive space.
  • Browser homepage changed, unwanted toolbars installed, and unrequested websites open up.
  • The computer starts acting on its own or shuts down without reasons.
  • The computer program or system crashes constantly, or the Blue Screen of Death appears regularly.

Guidelines to securing your computer:

  • Delete unknown e-mails. Never download or open suspicious attachments.
  • Turn on or install a firewall to prevent hackers from gaining access to your computer.
  • Avoid disreputable websites. You are most likely going to get some virus or spyware if you browse disreputable website such as porn sites or your computer.
  • Minimize the storage on your computer. Don’t keep all sensitive information on your mobile devices unless they are properly protected.
  • Don’t click on unknown or unfamiliar advertisements.
  • Keep your computer updated. Run antivirus scans regularly and ensure all software and security updates are properly installed.
  • Beware of external devices such as USB flash drives or external storage devices as they may release a computer virus to your system.
  • Secure your wireless network from being “piggybacked” by hackers.
  • Be alert to your surrounding before leaving your computer unattended.
  • Use a memorable but strong password for all your accounts.
  • Shut down or lock your computer when it’s not in use. Ensure that a secure password is required to start-up the system.
  • Avoid peer-2-peer file sharing software.
BE A SMART INTERNET USER
Take on the interactive elements to learn more
Did You Know?
Human is the weakest link in cyber security
As long as we are connected to the Internet, we can be a victim of cyber attacks. Organisations often invest in state-of-the-art technology but place lesser priority on security training for their staff.
Creating a strong password is your first line of defense to protecting your device.
A strong password is a combination of uppercase and lowercase letters, numbers, and symbols that represent a story only you know about, making it easy for you to remember but hard for the hackers to crack.
What would you do?
You noticed an unknown software installed on your work laptop. Do you...
inform your IT specialists about it?
forward it to another person?
open the unknown software?
ignore it and carry on working?
delete it?

CORRECT!