Further Security (Stay Safe Online: Conclusion)

Welcome back! This is the final part of our seprofessionlism wordleeries, and will sum up our tips for keeping yourself secure.

What does this have to do with e-Professionalism?

Imagine that your account was hacked. They may be looking to harvest information from you.  Or, they could use it to make damaging posts from your social media account – a French TV station recently experienced this (http://edition.cnn.com/2015/04/09/europe/french-tv-network-attack-recovery/). Keeping your account safe keeps it in your control, which means that no one else can damage your branding.

Okay, but what about my privacy?

How much information do you put out on Social Media? Do you think they could use that information to fool someone else into thinking they were you? These attacks, commonly known as Social Engineering (in a computing context), use your personal information to bypass security systems by working with humans directly – fooling support centres (for example) into handing over your information. The less vulnerable you make yourself, the less likely you are to be a victim of this attack that can result in credit fraud or worse. Many companies have strengthened their security against Social Engineering attacks recently, but the threat still remains and people have to be wary of this as they use the internet more and more.

Is there anything else I can do?

Keeping your computer and other devices secure is also incredibly important. Our colleagues at the Information Services department have produced this succinct yet comprehensive guide into keeping all of your devices secure from a variety of security issues. Finally, security is virtuous. Once you get into good habits, they are easier to work with. Having a password manager and different (secure) passwords for everything is actually easier than having one password for everything – and massively improves your security. And once it’s set up, you can mostly leave it. On the other hand, think how much time you’d have to spend recovering from a serious breach! We hope you found this series useful! It isn’t a complete guide to online and computer security  – and if you use online services and computers a lot, it really is worth spending a bit of time keeping up to date with security. However, if you followed these guides you will be in a much better position than when you started (hopefully)! Comments or questions? We’d love to read them on our social media accounts! Also, make sure you subscribe to this blog – or follow us on Twitter and Facebook – to keep up to date with what we’re doing.

Advertisements