Cyber security can sometimes seem out of reach. There are so many different cyber threats and so many different ways for cyber criminals to access your information, steal your identity and compromise your accounts. But becoming cyber secure is more achievable than you may think. Just follow these five (relatively) simple steps.
Step One: Create a strong password
Having a strong password is one method of protecting your information from cyber crime. Your banking records, your social media, your identity - this information is all just a stolen password away from being compromised.
A weak password means you're an easy target for cyber criminals looking to break into accounts to take what they want. A strong one means it will be difficult for cyber criminals to get access to your information.
Step Two: Enable two-factor authentication
Want to become more cyber secure? Enabling two-factor authentication on your most important accounts is one of the fastest ways to do so. Two-factor authentication gives you an added layer of security should anyone try to break into your account.
One example of two-factor authentication works like this:
You can also use another factor such as:
Two-factor authentication is an effective way to immediately boost your cyber security. That way, there will be a safeguard should anyone try to break into your account.
Step Three: Delete any suspicious emails
One of the most common risks to Canadians' cyber security? Email.
A common tactic for cyber criminals is to send Canadians emails that look like they are from a trusted institution, but in fact, are attempts to steal your information and identity.
Example: A cyber criminal might send a victim an email that looks like it's from their bank asking them to update their contact information. The email looks legitimate but is in fact an attempt to get you to visit a website that can steal important information.
This method - known as "phishing" - is just one way suspicious emails can compromise you. The best thing to do with suspicious emails? Delete them!
If you think you are receiving a legitimate notification from a bank or other body, try to contact them through an independent method such as looking up a phone number on a website. Otherwise, junk it!
Step Four: Download any system updates
Hands up if you've ever spent a day (or even several) putting off downloading a system update on your phone or computer?
Yeah, that's what we thought!
It can be tempting to avoid system updates. Who wants to take the time to wait for an update to install, then, if necessary, restart your device? But here's the thing: Not downloading that update is putting your device or computer at risk of a cyber attack. Your operating system (OS) manages all functionality on your computer or device, including many security aspects. As a result, it can be a vulnerable weak spot targeted by hackers if it isn't kept up-to-date.
The solution? Pretty simple.
Make sure you enable automatic updates on your OS so your device will automatically download and install these fixes as soon as they're available.
If your OS asks you to take action or download a fix manually, do it - your OS can't protect you if you don't empower it properly.
Updating your OS when you're prompted is one of the simplest things you can do to protect your computer. After all, it's easier to allow an update than to have to reinstall your operating system.
Step Five: Secure your smartphone
We use our smartphones for everything these days: social media, taking photos, and sometimes, on rare occasions, even for making phone calls. We also store a lot of information on them - web history, passwords, email, calendars, and contact information - that can make us vulnerable to cyber crime. That means it's important for us to protect our devices.
Here's how:
If you're putting all of this advice into practice, you're on your way to being more cyber secure. But it's still not a fool proof system - nothing is. To prepare for the worst, make sure you back up your vital personal information and practice recovering it at least once. This way you'll know what to do if you're the victim of a cyber crime like ransomware.
Conclusion
Think cyber security is beyond your reach? Think again! With these five steps you'll be well on your way to being more cyber secure.
Source: Government of Canada - GetCybersafe.gc.ca (Posted October 15, 2019)
Welcome!
If you are reading this guide, you are about to embark on a process that will help your organization harness the potential of technology to deliver your mission and best serve your community. Proactively planning for technology is about more than replacing old computers (although that might be part of your plan!). This process will help your organization fundamentally shift the way you approach technology investments toward greater mission achievement and community impact. It will identify opportunities for technology to help you control costs, reduce risk, raise funds, and empower staff.
Strategic technology planning – much like any strategic planning process – is a comprehensive look at the current state and the desired future state for your organization. If you just need some new computers, this may not be the right process. But if you are ready to treat technology as a mission-critical investment that can accelerate your organization’s impact, you are in the right place! Your nonprofit has much to gain from appropriately integrating technology into your operations, communications, fundraising, and service delivery. This guide offers step-by-step support to help you lead your organization through technology planning, resulting in a roadmap to smart technology use.
Acknowledgements
This guide has been produced through the generous support of the Rasmuson Foundation, a private foundation that works as a catalyst to promote a better life for Alaskans. Learn more at www.rasmuson.org. It was written and edited by Lindsay Bealko of Toolkit Consulting, who helps mission-minded organizations design creative communications, engaging education, and powerful programs. Learn more at www.toolkitconsulting.com.
Special thanks to Orion Matthews and Jeremiah Dunham of DesignPT for their substantial contributions to and reviews of this guide to make it as useful as possible to nonprofit organizations who are ready to harness the strategic potential of technology. Learn more and request help with your strategic technology plan at www.designpt.com.
Please help us improve our website by providing your feedback