top of page

Intermediate Guide

Welcome to the Intermediate Guide on how to stay cyber secure! Help yourself to helpful tips and tricks underneath!

Safe Browsing Practices

What are the best practices for browsing on the web?

First things first, make sure you are using strong passwords and enable two-factor authentication when possible just to stay extra safe. Pay close attention to downloaded or posted material, trust your gut and stay clear of anything suspicious.

 

Sometimes, websites have multiple pop-ups (a small window that appears within the website, usually to advertise something), so make sure to properly read the content of them before clicking, as sometimes websites use them to confuse you. And remember, always keep your software up to date, and stay in the know of current online threats!

What are the best practices for browsing on the web?

In our digital age, cyber threats can lead to identity theft, malware and viruses and even online harassment (cyberbullying). When it comes to online shopping, there can be fraudulent sites that after purchasing, collect your personal information or even your money. This is why utilizing safe browning practices is crucial every time you're on the web!

What are warning signs to decide whether a website is trustworthy or not?

In our digital age, cyber threats can lead to identity theft, malware and viruses and even online harassment (cyberbullying). When it comes to online shopping, there can be fraudulent sites that after purchasing, collect your personal information or even your money. This is why utilizing safe browning practices is crucial every time you're on the web!

Cyber Hygiene Practices

What are some basic Cyber Hygiene practices everyone should follow?

Some basics to keeping good cyber hygiene include:

  • Proper mobile security

  • Using a password on your phone that changes regularly

  • Updating your phone regularly

  • Not selecting the “remember me” option on mobile sites and apps when entering a password

  • Deleting all private information on a device before getting rid of it

  • Using strong passwords that look like a mix of characters, numbers, and symbols (more information on how to create a safe password can be located within the beginner tab on our site)

  • Safe social media use includes not posting personal information

  • Using different passwords for your social media accounts

  • Stay cautious when getting messages from those you don't know. 

  • Log out of public devices after using 

Multi-factor Authentication

What is it?

Multi-factor Authentication also known as MFA is a verification mechanism that needs users to provide two or more verification factors proving their identity before gaining access to an account. Examples include matching something you know, like a password, to something you are, including a face ID or fingerprint (the hardest factor to impersonate). Setting up multi-factor authentication varies on different accounts but it starts within security settings making sure MFA is enabled. From here choose the desired second method of authorization, and authenticate it.

Why is it important?

Multi-factor authentication makes it much harder for hackers to gain access to your personal information. Specifically, it provides extra layers of security, prevents accounts from being compromised in a data breach, alerts users of suspicious login attempts and precludes identity theft. 

Stay informed, join our newsletter

Thanks for subscribing!

bottom of page