“If I could sum up why I’m committed to the HR Girlfriends community it would come down to because we are ‘….in this together.'”

~Sana’ Rasul, Chief Girlfriend

CyberSAFE-ty in Public Places

The internet has become a vital part of people’s daily lives. It is a beautiful place full of information, entertainment, and also full of dangers. Over the last few years, cyber attacks have increased and spread to all over the globe. With the intention to steal usernames, passwords, travelers’ access and accounts, hackers mainly target women and small business people who have access to sensitive accounts.

Public Wi-Fi connections present significant threats to their users. Hackers use a variety of software to create a connection that mimics the Wi-Fi connection of the hotel, restaurant or hostel. When users try to access it, they are infected with EternalBlue, which gives hackers access to the users’ details. Below is a guide on how small business and the general public can identify and protect themselves from malicious internet connections.

Enroll in a CyberSAFE Training Class

Training is one sure way of ensuring cyber security in business. Companies should make sure that they attend the regular classes of CyberSAFE to make sure that all employees are aware of the new tricks used by hackers. The cyber security issue is not limited to businesses only; individuals should as well feel free to attend CyberSAFE training programs to avoid from falling victims of the witty hackers.

Keep Software Updated

Hackers will find a weak link in the software used by individuals or companies. Updating all the software can fix such vulnerabilities. Software firms create updates that can easily fix these vulnerabilities. Additionally, it is also essential to back up critical data. Back up enables data and file retrieval in an event where data has been lost. Information should be backed up at a different location to prevent hackers from accessing all the data.

Secure the Wi-Fi Network

Organizations and individuals with workplace or home Wi-Fi connection should ensure that it is secure, encrypted and hidden. To make sure that the internet connection is hidden, set up a wireless access point (service set identifier) such that it doesn’t broadcast the network name. Set a password to protect access to the wireless access point.

Choose Strong Passwords

The easiest way to a cyber breach is through passwords. If hackers know individual or company password, they have a simple time accessing all the information. Passwords such as 1234 are guessable. People should choose passwords that mean something significant to them, but unknown to others.

Ensure that the passwords set are easy to remember. In an event where passwords are written down, they should never be left in plain sight. Ensure that they are not kept on the computer desk. Individuals and enterprises should avoid using the same passwords for multiple accounts. It is also wise to change passwords after a few months.

Verify the Connection

Hackers might alter the name of the internet connection by a single letter. Unknowingly, people log in using the malicious connection developed by the hackers. (ie. McDonalds-Guest might be McDonaldsGuest) To avoid this, individuals and employees using shared connection should confirm the name of the connection from the relevant authority within the premises.

Beware Of Phishing Scams

Phishing emails are messages that appear from legal organizations such as banks and stores. They provide fake links to fake websites and ask for personal information. In such a scenario, keenly observe the email address. In most cases, the sender email address doesn’t match the email of the organization they claim to represent.

Avoid phishing email scams claiming to be from a bank or any other company trustworthy organization. All suspicious e-mails should be forwarded to the organization it claims to be sent from. They will always confirm if it is real or malicious. E-mail programs never ask for passwords, so don’t fall a victim.

Limit the Information Shared On Social Media

Many people especially women post their maiden names, parent names, birthdays, home address, cell phone numbers and other sensitive information. This information gives stalkers plenty of information to use.

Many secure sites especially the banking, insurance and school websites ask questions such as mother’s maiden name, child’s birthday, and many other related questions. All these information can be found on Facebook pages of many people who end up being victims of cyber attacks.

Conclusion

With the increase in data breaches, cyber security is becoming a top priority for businesses and some individuals. Hackers are evolving improving their capability day after day. It is, therefore, essential to get a CyberSAFE training to protect crucial information from leaking.

Sources
https://www.fcc.gov/general/cybersecurity-small-business
http://www.hoparoundtheworld.com/step-6/internet-cafe-safety.php

 

Looking to make your Company CyberAWARE?
Get hooked into Corporate Training!

Leave a comment

Never miss an opportunity to earn HRCI/SHRM credits, identify a mentor, or connect 1:1 with another HR Girlfriend in your city or across the country.

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
Author picture

HR Girlfriends™ is a Human Resources networking organization dedicated to advancing the practice and culture of people empowerment. Our team of Girlfriends consult, train, educate, develop, share, promote, and advocate for solutions in the field of human resource management.

Are You IN?
Or Are You OUT?

It’s time you join forces with a community of like-minded peers ready to tackle the issues unique to the women of HR.
  • All
  • Affirmation
  • Career Mondays
  • Certification
  • COVID-19
  • CyberSAFE
  • Guest Blogger
  • HR Advisor
  • HR Law Alert
  • HR Q&A
  • HR Reading
  • HR Reel Talk
  • Join Our Team - Apply Now
  • Membership
  • Talent Management
All
  • All
  • Affirmation
  • Career Mondays
  • Certification
  • COVID-19
  • CyberSAFE
  • Guest Blogger
  • HR Advisor
  • HR Law Alert
  • HR Q&A
  • HR Reading
  • HR Reel Talk
  • Join Our Team - Apply Now
  • Membership
  • Talent Management
HR Q&A

Q&A: What is Discrimination Based on National Origin?

Yes. Discrimination based on national origin is prohibited under Title VII of the Civil Rights Act and includes treating applicants or employees unfavorably because they ...
Read More →
Affirmation

Affirmation: I outline the big picture on my canvas before I paint in the small intricate details

Just as a painter envisions his masterpiece, I envision living my dreams. I know where I am going and how I plan to get there. ...
Read More →
HR Q&A

Q&A: A remote employee’s roommate has been disrupting their work to the point that their performance is suffering. How should we handle this?

This situation should be handled the same way you’d manage most work disruptions affecting an employee’s performance. Start by having a conversation with the employee ...
Read More →
Share via
Copy link
Powered by Social Snap