Before you begin: it is assumed that you have read and completed all steps in the Personal Cyber Security: First Steps guide before starting this guide. If you haven’t yet, we recommend you read that document first.
This guide builds upon the steps you’ve taken and the cyber secure thinking you learned in the First Steps guide, and provides the next level of actionable steps and thinking to increase your cyber security to help protect you from cyber threats.
Before you begin: you should read the Personal Cyber Security: First Steps guide and activate multi-factor authentication (MFA) on your most important accounts (online banking and email).
Using MFA on your accounts makes them much harder for cybercriminals to access. Cybercriminals might manage to steal one authentication type (such as your password), but they still need to obtain and use the other MFA method/s to successfully access your account, requiring extra time, effort and resources.
Tip: If you have a lot of accounts to secure, prioritise the following:
- Accounts that save or use your payment details (e.g. eBay, Amazon, PayPal)
- All social media accounts (e.g. Facebook, Twitter, WhatsApp)
- Any other accounts that hold personal information (e.g. myGov, Apple ID, iCloud, Uber)
The steps for activating two-factor authentication (2FA), the most common form of MFA, are different depending on the account.
Before you begin: you should activate MFA on all of your accounts that support it.
A passphrase is a more secure form of password. Passphrases use four or more random words as your password, and are most effective when they are long, unpredictable and unique.
If your account does not support MFA, use a unique strong passphrase as your password to protect your account.
Tip: If you have a lot of accounts to secure, prioritise the following:
- Accounts that save or use your payment details
- User accounts on your personal devices
- Social media accounts
- Any other accounts that hold personal information
- Accounts who have had their details leaked online (see the following steps)
Remember to never reuse a passphrase or password across multiple accounts.
To check if any of your account usernames and passwords have been leaked online by cybercriminals, take the following steps:
Ensuring your accounts have unique passphrases is vital, as reusing a passphrase allows cybercriminals to easily take control of all of your accounts that use the same passphrase if it is leaked online.
Having trouble remembering each unique passphrase you use to secure your accounts? Many people use a password manager which can securely store your passphrases.
You may choose to keep track of your passphrases in a notebook rather than a password manager. No matter how you keep track of your passphrases, ensure you have a secure storage method.
Tip: Every time you login to an account, add your login details (username and passphrase) to your password manager and, if needed, change any old insecure passwords into unique strong passphrases.
For more advice on how to build strong passphrases you can read the Creating Strong Passphrases guidance, or read our Personal Cyber Security: First Steps guide.
Your internet connection is a way for you to interact with the outside world, but it also provides a channel into your device. If your Wi-Fi connection isn’t secure someone may use it to steal your personal or financial information for malicious purposes.
Public Wi-Fi ‘hotspots’ like cafes, airports, hotels and libraries are convenient, but they can be risky. It’s easy for information sent using public Wi-Fi to be intercepted, so you need to be careful about what information you send or receive while connected.
When using public Wi-Fi follow these suggestions to stay secure:
- Avoid sending or receiving sensitive information while connected to public Wi-Fi networks.
- When online banking or shopping, sending confidential emails, or entering passphrases/passwords or credit card details into websites, switch to your cellular data connection or wait until you’re on a secure home or office connection.
- Always try to confirm the ‘official’ hotspot name from venue staff and manually connect your device to it.
- Do not let your device automatically connect to public Wi-Fi networks by disabling this option in your device’s Wi-Fi settings.
- Remember to disconnect from the Wi-Fi network and clear it from your device after you have finished using it.
Disposing of a device (by discarding, recycling, selling or giving it away) without taking steps to remove your data may give other people easy access to your personal information and data.
Before disposing of your computer, phone, tablet, games console or any other smart device, you should:
Remember that disposing of a device without taking steps to remove your data may give other people easy access to your personal information and data.
Malware is a blanket term for malicious software designed to cause harm, such as ransomware, viruses, spyware and trojans. Malware can:
The steps you can take to protect your devices from malware include:
- Enable automatic updates for your devices.
- Be vigilant online: be wary of opening links, emails or files from unknown sources.
- Activate real time protection on your Windows 10 devices.
Real time protection is a security feature that helps stop malware from being installed on your device.
This feature is built into Microsoft Defender, a comprehensive antimalware and threat detection program that is part of the Windows 10 security system.
Prevention is better than a cure. Unlike an antimalware scan, which searches for malicious files or programs that are already on your device, real time protection will detect and stop malware before it gets to your device.
Real time protection should automatically turn itself on. However, it can be temporarily switched off, so it is important to check that the feature is up and running and is actively protecting your device.
Ransomware is a type of malware that locks down your computer or files until a ransom is paid. It works by locking up or encrypting your files so that you can no longer use or access them. Sometimes it can even stop your devices from working. Ransoms are typically paid using an online digital currency or cryptocurrency such as Bitcoin, which is very difficult to trace.
The ZMCIRT recommends you do not pay the ransom as there is no guarantee you will regain access to your information. You may also be targeted by another attack.
Ransomware can infect your devices in the same way as other malware, including:
Ransomware protection has the ability to prevent many types of ransomware attacks from happening. In the unfortunate event of an attack, ransomware protection can also interrupt the ransomware from encrypting all your data, which minimizes the extent of the damage.
Backups can also assist in recovering your data as part of the recovery process following a ransomware attack.
If you are using Windows 10, you can enable built-in ransomware protection to protect your files. Follow the steps in the ZMCIRT’s Step-by-Step Guide: Turning on Ransomware Protection in Microsoft Windows 10.
If you are using another operating system, you may need to source and install ransomware protection for your devices.
In addition to installing ransomware protection, you should also back-up your information. You can read more about how to do this in the Personal Cyber Security: First Steps guide.
That way, even if an attack is successful, you will at least have your important information accessible elsewhere.
As soon as you go online, you start creating a trail of information about you. This is known as your digital footprint.
Cybercriminals can use this information against you, by using it to create convincing scams that specifically target you or someone you know.
With a simple Google search, cybercriminals could find your:
Such data could also be used to identify personal details that you have included in your passwords, PINs, or in the answers to your account recovery questions.
This information could be used by cybercriminals to access your accounts and devices.
Protecting your identity online can go a long way in reducing the chances of being targeted by cybercriminals.
To reduce your digital footprint:
When using apps and browser extensions on your devices, use the following cyber secure behaviours and thinking:
Copyright @2023 ZAMBIA CIRT