Phishing

Have you ever visited a website that looks like the original but on carefully observation its fake, if so, someone might be trying to steal your personal information such as login details.

What is Phishing

Phishing is a process of trying to find private information such as PINs and passwords by trickery. It is achieved creating a fake website and make the login page look like the original. On you inputing your login details, they are stored by the hacker and used for nefarious activities.

For instance if it was a fake facebook page that you entered your login details, the hacker will have access to your account and can use it to send unauthorized messages, adverts, close your account etc. If it was a fake internet banking login page; on inputting your login details the person may now have access to your account, view you credit information and even withdraw money.

What to do if you have been Phished

  1. Run antivirus software in your computer device
  2. Change the password of the affected account.
  3. If you cannot access your account call customer care agent .

How to prevent being phished

Check carefully the website structure/login page that it is exactly the original.

Ensure the web address uses https and not http.

Web browsers such a Google chrome may issue a warning if it suspects phishing.

How to Respond to Cyberbullying

What is Cyberbullying 

First of all I will start by defining Cyber Bullying. Cyber Bullying is when someone sends abusive or insultive words or messages to you by electronic means. For instance, someone can send threats or  insultive words to your phone through your social media accounts such as facebook, Twitter, WhatsApp, Text message, Anonymous or non anonymous phone call and so on. Anyone can be cyberbullied, however this phenomenon is usually common among popular figures, such as sports men and women, politicians, religious figures and so on.

How to respond to Cyberbullying. 

The best way to respond to Cyberbullying is to block the person on the online platform which he/she uses to send those messages. For example if you are being bullied through a phone call you can block the  person’s number or numbers. This will prevent further calls or text messages from that person. Similarly, on online social networks such as Twitter and Facebook you can block any person from sending messages to you. The process is easy. All social networking sites have instructions on how to block and unblock accounts of people from sending messages to you.

If the Cyberbullying is done anonymously, or the person uses fake accounts to send messages, take a step further by reporting the situation to the administrators of the online plateform.

About Cookies

HTML cookies are some kind of data that is stored on your computer/ phone through your web browser while browsing. Cookies stores information such as your browsing history, and other kind of information which make you have a good browsing experience.

One good thing about cookies is that it can help you to quickly fill form online on a website using information you have previously entered in another website.

Some people don’t like cookies because it records their browsing history or make some other people log on to a website they have previously visited on their computer because it auto filled the login details for them.

You can control how cookies work or even disable it completely. However disabling cookies isn’t recommended. Some websites may not even work at all if cookies is not enabled.

To control how HTML cookies work, visit the help page of your browser.

How to control Cookies in Google Chrome

Click the 3 dots icon at the top right of the browser window.

Select Settings.

Scroll down to the bottom and click, site settings, in the advanced section.

Then click Cookies, there you will be given options to control how cookies should work for you.

Password Ethics

About Passwords

Almost every software application and technological device will require a password to control access. This means that the number of passwords you need to remember, grows. Moreover there is always the tendency to use the same password for devices or applications. This habit should be avoided as it poses a serious security risk. Even if you have 20 passwords they must all be unique. So how should you handle your passwords, checkout the sub topic passwords ethics below;

Password Ethics

  1. Keep all your passwords unique; yes, if you have 20 devices/apps. that require passwords, they must all be different. 
  2. The passwords should not be easy to guess; ensure that your passwords are not patterned such that it makes them easy to decode.
  3. Avoid short passwords;The longer, the better.
  4. Make strong passwords by using a combination of symbols, numbers, lower and uppercase letters.
  5. Keep your passwords in a safe place. You can write them down and store them in a place only known to you. You can even store them in your computer, just don’t make it obvious. Better still, you can use a password manager 

How You Can Improve Your Cybersecurity for Free

You are always a target  for hackers (be prepared)

Always understand that your computer, phones or private information can be hacked. Take precautions in whatever you do in this regard. Encrypt, use PIN or password to protect your sensitive data.

Use antivirus and other security software packages.

On your computer devices, always endeavor to install and use antivirus and similar security packages. In some cases, you can install them for free. For instance Windows based PCs come with a free but very powerful security software called Windows Security. Most high end android phones come with free premium antivirus and encryption software.

Encrypt sensitive data

Always encrypt sensitive data. Encryption protects your data against unauthorised access. Do not transmit sensitive information except it is encrypted.

Use HTTPS when working with sensitive information on a website.

Never transmit sensitive information unless on a website except it is using SSL/TLS encryption, and the page loads with HTTPS, not HTTP.

Back up often

Always back up sensitive data regularly so that in the event of a computer crash or hacker attack, you can recover without any troubles.

Do not share account login details with people

Do not share your login details of sensitive accounts with people you don’t trust. If possible, don’t share your login details with anyone.

Use proper authentication

Avoid use of complex hard to remember passwords.

Don’t overshare on social media

Use social media wisely, mind the type of information you post on sites such as facebook twitter, instagram and so on.

Use public/school/company Wi-Fi Safely

While public Wi-fi is good, do not use them to transfer sensitive data as these public networks are not as safe as private networks. Also these type networks are closely monitored.

How to Hard reset a Mac PC

Before you hard reset your Mac, it is wise to do the following.

  1. Back up important data
  2. Sign out of iTunes, messages and iCloud
  3. Unlock any app that is locked to your Mac

Doing the above steps will make it easy to logon to these platforms after resetting your device.

To hard reset do the following;

1.Restart your Mac and hold down the Command and R keys while it boots.

If you are asked to choose a language of your choice, choose English 

2. Run the Disk Utility.

3. In the Disk Utility screen, select your device’s main hard disk volume, then click on Unmount, then Erase.

4. Erase all contents of other disks in the device.

5.  Exit the Disk Utility by clicking Quit Disk Utility in the Disk Utility menu.

6. Click on Reinstall macOS and follow the steps to reinstall the operating system onto the primary disk.  

How to Hard Reset your iPhone

To hard reset your iPhone do the following:

1. Run the Settings app and choose General ,   Reset ,  Erase All Content and Settings.

2. If you’re asked for your Apple ID and Password to confirm the reset, enter them.

3. When you see a warning and a red Erase iPhone (or iPad) button, click on it.