Technology

Safeguarding yourself from cybercrime

cybercrime Safeguarding yourself from cybercrime

Written by Damion Anglin.

The use of digital technology is rapidly becoming the norm in today’s society. Global pandemics among other circumstances have brought to the fore the relevance of online platforms and digital spaces in preserving the functionality when presented with physical or other constraints.

Related: Design thinking will be essential in a post-coronavirus world.

This growing digital affair, however, carries with it a range of concerns in the minds of many who feel they are vulnerable to the sly genius of cyber hackers who may easily manipulate their online platforms and undo what took a lifetime to build.

So how do we protect ourselves from the threat of online poachers and internet-based scams? Here are a few ‘Buzzz’ worthy tips that might help in safeguarding yourself from cybercrime.

ONLINE PLATFORMS AND PASSWORDS

cybercrime is rampant on social media. Twitter recently got hacked and used in a bitcoin scam.
cybercrime is rampant on social media. Twitter recently got hacked and used in a bitcoin scam.

Whether you bank online or store sensitive information to online systems, a few practices to adopt in order to monitor the well-being of your information include:

1. Creating complex passwords that only you can remember

2. Never share your password with anyone or recording it where it can easily be accessed

3.Changing your passwords every couple of months

4. Regularly check your accounts and reviewing account activity 4. Setting alerts to notify you of any activity on your accounts

PHONE CALLS AND EMAIL PHISHING

cybercrime is rampant on social media. Twitter recently got hacked and used in a bitcoin scam.
cybercrime is rampant on social media. Twitter recently got hacked and used in a bitcoin scam.

Whenever you receive a call or an email that makes you suspicious or requires you to share sensitive information; a number of best practices to include:

1. Not answering any personal information

2. Taking the full name and department of the caller and asking if you may return the call

3. Noting the address of the suspicious email and the employee signature attached

4. Immediately calling the trusted number you are aware

To read more, please purchase a copy of Buzzz Caribbean Lifestyle Magazine Vol 10 #6 in a store near you.

Related: Protecting your children from inappropriate content

Follow the Buzzz on Instagram