Do you share thoughts and memories, pictures of holidays, gatherings and other adventures online? Do you share these things on one or more social media platforms?
One of the most vulnerable and common channels for attack is outdated software. Cyber criminals have millions of infected machines that continually scan the internet looking for vulnerable devices to attack. They use holes in software, operating systems and communications, to push their way through the cracks and try to execute code, and once they have a foothold they can cause a huge amount of damage.
Damage could include:
- stealing your information
- using your device without your knowledge to spread malware, attack online services, mine cryptocurrency, etc.
- overriding safety settings on your device and encrypting the data.
To avoid this you should actively keep your device up to date installing updates that are available for your device. Also make sure you keep software and apps on your devices up to date. These updates often ‘patch’ security vulnerabilities that criminals use to exploit devices. Take a few minutes now to make sure your device is up to date.
Other things to consider.
- Make sure you download software from reputable sources such as Apple App Store, Google Play, Microsoft, Amazon, Steam.
- If you are getting ‘free’ software, what are you giving the publisher in return? They might be tracking your location or want access to your address book.
- Use anti-virus and anti-malware tools to scan your device regularly (yes, even MacOS users should do this).
- Avoid using portable USB storage across multiple devices.
- Is information on your device backed-up somewhere?
- Is your device need a password to gain access? – it should.
- Use a secure browser and think about where you are browsing too, is it ‘legit’?
How to report a cyber security incident at UC
Log a ticket on the IT Self Service portal>
Ring IT Service Desk on 0508 UC IT HELP (0508 824 843) or on 03 369 5000.
Email firstname.lastname@example.org and attach phishing email, ensuring header of scam email is included.