You are on page 1of 11

IMPLICATIONS OF

MISUSE AND
CYBERSECURITY(cont’d)
Personal Security practices.
Personal Security Practices

Personal security practices are


countermeasures used to
utilize computer and
cybersecurity.
Practicing Personal Security

There are a number of simple steps that you can take to improve your
personal security in. First, be sure to use a strong passwords and
PINs. Make sure that you change your passwords regularly, and
avoid using the same passwords for different sites. Also, be sure to
sign out of your accounts when you finish using them, and do not
leave your computer unattended.

Another common form of security is to back up your files and


data. Keep your software updated to prevent the risk of losing your
data.
Personal Security Practices
Defence against identity
theft. Using Anti-virus Protection
• Don't share you personal • Anti-virus software blocks
identity information with malware and other malicious
anyone whom you don't viruses from entering you
know personal. This includes device and stealing your
dates, places names, data.
birthdays, full names of
family members, close
friends and associates.
Personal Security Practices
Limit use of open Wi-Fi networks Always be aware of phishing emails
• Never conduct sensitive • Remain alert whenever you
work over an open Wi-Fi receive an unsolicited email.
connection, such as online
banking, and take extreme • Check URLs and hyperlinks
caution when doing so. before clicking; ensure that
each is from a trusted source
and is legitimate, especially
those contained in
unsolicited emails.
Personal Security Practices
Access sensitive files only on a secure
Keep track of your mobile devices network

• Always be aware of the • Don’t use a public Wi-Fi without


location of each device, and using a Virtual Private Network
make sure that those in (VPN). By using VPN software,
the traffic between your device
storage require a password
and the VPN server is encrypted.
or PIN to access when This means it’s much more
powered on. difficult for a cybercriminal to
obtain access to your data on
your device. Use your cell
network if you don’t have a VPN
when security is important.
Personal Security Practices
Use Two-factor or multi-factor Use a secure file-sharing solution to
authentication encrypt data.
• Two-factor or multi-factor • If you regularly share
authentication is a service information, you absolutely
that adds additional layers of need to start using a secure
security to the standard file-sharing solution.
password method of online Because if the emails are
identification intercepted, unauthorized
users will have access to
your precious data.
Personal Security Practices
Disable Bluetooth when you don’t need it. Remove adware from your machines
• Devices can be hacked via • Adware collects information
Bluetooth and subsequently about you to serve you more
your private information can targeted ads. It’s best to rid
be stolen. If there’s no your computer of all forms
reason to have your of adware to maintain your
Bluetooth on, turn it off! privacy.
Personal Security Practices
Scan external storage devices for viruses Avoid the “secure enough” mentality
• External storage devices are • Unless you’re completely
just as prone to malware as isolated from the rest of the
internal storage devices. If world, there’s no such thing
you connect an infected as being “secure enough.”
external device to your Big companies like
computer, the malware can Facebook invest a fortune
spread. Always scan external into security every year but
devices for malware before are still affected by cyber
accessing them. attacks.
Questions?
• Define personal security practices.
• What does it mean to “Defend against identity theft”, give an
example?
• Why shouldn’t you use public WI-FI without a VPN?
• State TWO other personal security practices other than the two
stated above.
Scenario

Examine the scenario and state the problem and what can be
done to prevent it.

You might also like