Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange



Similar documents
Cyber Security Awareness

Cyber Security Awareness

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Infocomm Sec rity is incomplete without U Be aware,

Common Cyber Threats. Common cyber threats include:

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

Computer Security Maintenance Information and Self-Check Activities

Malware & Botnets. Botnets

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Desktop and Laptop Security Policy

How to stay safe online

Network Security and the Small Business

Learn to protect yourself from Identity Theft. First National Bank can help.

Countermeasures against Spyware

PC Security and Maintenance

Retail/Consumer Client. Internet Banking Awareness and Education Program

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Business ebanking Fraud Prevention Best Practices

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

1. Any requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Tips for Banking Online Safely

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Protecting your business from fraud

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Payment Fraud and Risk Management

Cyber Security. Maintaining Your Identity on the Net

A Guide to Information Technology Security in Trinity College Dublin

Protecting Yourself from Identity Theft

Version: 2.0. Effective From: 28/11/2014

BE SAFE ONLINE: Lesson Plan

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

Things you need to know and do to operate safely online INTERNET SECURITY ESSENTIALS FOR SMALL BUSINESS

Identity Theft Protection

Internet Security. For Home Users

Information Security

Frequently Asked Questions

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Information Security. Louis Morgan, CISSP Information Security Officer

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

AVG AntiVirus. How does this benefit you?

Guidelines for Account Management and Effective Usage

Safe Practices for Online Banking

Boston University Security Awareness. What you need to know to keep information safe and secure

Cyber Essentials Scheme

Computer Security Self-Test: Questions & Scenarios

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Open an attachment and bring down your network?

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

Cyber Security: Beginners Guide to Firewalls

General Security Best Practices

Information Security

The Importance of Security Awareness Training

October Is National Cyber Security Awareness Month!

Network Security Policy

Remote Deposit Quick Start Guide

F-Secure Anti-Virus for Mac 2015

Top tips for improved network security

Customer Awareness for Security and Fraud Prevention

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Network Security. Demo: Web browser

Fraud Guide Fraud Protection

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.

What are the common online dangers?

Enhanced Security for Online Banking

ANTI-VIRUS POLICY OCIO TABLE OF CONTENTS

CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3

Network Incident Report

Countermeasures against Bots

Computer Viruses: How to Avoid Infection

COSC 472 Network Security

Computing Services Information Security Office. Security 101

National Cyber Security Month 2015: Daily Security Awareness Tips

E-BUSINESS THREATS AND SOLUTIONS

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

Don t Fall Victim to Cybercrime:

NC DPH: Computer Security Basic Awareness Training

Security awareness training is not a substitute for the LEADS Security Policy.

Transcription:

The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are describing information security concepts and define steps to safeguard information. Firewalls If you computer / tablet / mobile phone is connecting to the Internet, then it should utilize a software firewall. It creates a barrier between the Internet and your computer. Firewalls should be configured to prevent unauthorised people from accessing the computer for personal or sensitive information. A periodic check needs to be done on the firewall manufacturer s website for updates. Patching There are scrupulous elements, which are constantly on the job of finding loop holes in the security of your computer software. These people try to infect your computer with a virus, spyware etc. When these issues are discovered, your software vendor corrects the problem with a fix or a patch. This patch should be applied at the earliest as the intruders can clear your system off its information in just a few days. Malicious Code Protection Malicious code can come in any form including virus, worm, Trojan etc. It can camouflage as an infected web page or as a downloadable game, screen saver or an email attachment, which you unintentionally click and activate. So, unknown attachments from unknown senders should not be opened. Computer viruses are programmes that multiply, spread or self-replicate. All they need is an interaction with someone for activation. The virus can arrive in the form of an email message as an attachment. It can be activated by clicking open an attachment, mail or by visiting a dubious website. The viruses could take over storage space or cause disturbance in screen displays, while some others steal or destroy information. If any computer is infected by a virus, the information on the hard drive may be lost or compromised. The virus can also spread to other machines, which share the information that you access. 1 / 5

Worms are similar to viruses because they multiply through self replication. The difference is that they do not require any sort of interaction from the user for activation. They multiply due to loop-holes in the software. Trojans, which are also called backdoors, are malicious code. They are probably trickiest of all, as they enter your system hidden in legitimate programmes. They perform unauthorized activity, when you activate those legitimate programmes. The activity that the Trojans can initiate could range from stealing your passwords and credit card information to enabling someone else in a remote location to take control of your computer. The attack on a website, which floods it with requests, forcing regular services to be either slow or interrupted is called a denial-of-service attack. Sometimes, a group of compromised desktops are combined remotely, to attack a system. Spyware gets downloaded from web pages or gets installed with freeware without your knowledge. It tracks your activity on internet, records your passwords and personal information to send to a malicious website. Email messages that contain offers of free money, dire warnings or resemble chain letters are called Hoax. Whenever you receive a hoax via email, simply delete it. Hoaxes not only slow down the servers but also could act as a cover for a hidden worm or virus. If you observe some erratic behavior in your computer behaves, then be cautioned that it could be act of the viruses. Run a full scan after disconnecting the PC from the Internet. You are then advised to contact your computer support representative in case the infection seems serious. How to protect your system and the information in it? 1. Ensure that the anti-virus software is updated on a weekly basis. New, fast spreading infections appear every day. 2. Scan the software for viruses before using it, no matter where you purchased it from. In 2 / 5

case you don t have a virus scanner seek help from your computer support representative. 3. Write Protect CDs, USBs, diskettes etc., to prevent infection. 4. Avoid loading free software on your system from unknown sources. 5. It is advisable to block extensions like.bat,.cmd,.com,.exe,.msi,.pif,.scr, or.zip. You can use content-filtering software for the same. 6. It is advisable to create separate accounts with restricted privileges. Read email and browse internet with the restricted account as viruses need administrator privileges to infect a PC. 7. Exercise caution while considering unsolicited email attachments, even from known sources. Every suspicious email with web-link or attachment should be verified with the source before opening. 8. Be careful with file and music sharing services as you could inadvertently share files without your intention. The files that you download from these services could contain malicious code or other viruses. 9. In case of an infection, depending on the seriousness, you would have to re-install the operating system. Phishing Phishing is a kind of scam in which an unsolicited email or pop-up message directs you to click on a link. That click could take you to a malicious web site, which prompts for personal information like PIN number, social security number, bank account number or credit card number. These websites may seem very authentic. However, they are not legitimate. A successful phishing scam can access personal accounts and other sensitive information. UAE Exchange will NEVER ask you to provide, confirm, or update account or personal information via email or pop-up message. If you receive such a mail then consider it as a phishing attempt. Please do not click on the link, because it could download malicious software to your computer. e-mail is NOT Secure Information is transferred in plain text through public routers and mail servers, unless the email is encrypted. It is advisable not to include sensitive information like account number, password, and social security number, in an unencrypted form while sending them in an email. 3 / 5

Passwords/PINs Your user ID links you to your actions on the system in the virtual space. It is your identity and is authenticated by your password/pin. Please take every measure required to protect your ID and password. Remember you are held responsible for any action taken with your ID and password/pin. Best practices 1. Change your password/pin periodically and do not use your earlier passwords. 2. Avoid using the same password for all your accounts. NEVER share your password with ANYONE. 3. AutoComplete feature found in popular browsers might be convenient. But it can also be dangerous in terms of security risk if the entries memorised happen to be your security answers or passwords. This feature and other password managing services are vulnerable to theft of sensitive information, if you are not the only person to access to the computer. Eg: Work place, internet cafes etc. 4. Maintain long and complex passwords with eight or more characters. Ideally it should be a password that s easy to remember but hard to guess. It should be a good mix of numbers, letters and special characters. For example, using first letters of the sentences in a popular song or poem, like The big Red fox jumped over the Fence to get the hen! becomes TbRfjotF2gth!. 5. Change your password immediately if you feel that it has been compromised. Social Engineering Gaining access to the system or information through misrepresentation is known as Social Engineering. In this process people are manipulated to obtain information without their knowledge through impersonation using telephone, in person or through email. They are enticed through emails to open an attachment, which activates a virus into their system. 1. Whenever a caller solicits information through telephone, please check if the individual is authorised to receive it before sharing. UAE Exchange will NEVER call and ask for your username and/or password. 4 / 5

2. When an email lands in your inbox with an unusual attachment, please verify if it is from someone you know, ensure your anti-virus software is active and that the message in the email is relevant to you. If any of the questions creates a doubt in your mind then the attachment may contain a virus. Just delete it. 5 / 5