Cybersecurity Tip of the Week

id = "FBMainForm_38110945" action="/cybersecurity.html" method = "post" onsubmit = "return false" >
Cybersecurity Tip of the Week Search  

 
Online Gaming and Entertainment
by FCNB on 

The risks of online entertainment, games and contests

The fun of online entertainment, games and contests can be dampened by the risks involved with these sites. But if you know the risks, you can play games online safely.

What are the risks?
  • Inadvertently downloading viruses, Trojan horses, worms, and spyware contained in game downloads onto your computer.
  • Dealing with fraudulent entertainment sites that require a credit card number to continue watching or playing. They may also pause the game mid-action and ask you to call a long distance number (and not hang up) in order to continue playing.
  • Interacting with strangers who trick you into giving up personal information.
  • Exploitation of security settings on your computer, giving criminals access to your information. This could lead to identity theft.
  • Dealing with real-world and online predators who lure you into giving them information about yourself. This could include inappropriate contact with children by predators posing as a child.
  • Participating in a real-world marketplace in on online game (where you can buy high-level characters, for instance) could involve real-life criminals who are looking to steal your money. Only make credit card payments on sites you trust and don't send money transfers, cash or make payments outside of the site.

Find out more about online contest scams and Internet gamingsafety tips.

*Blog post from Cyber Safe, for more information visit: https://www.getcybersafe.gc.ca/cnt/rsks/ntrnt-thngs/hm-en.aspx



Comments     Permalink     Add Comment

Cybersecurity while traveling
by FCNB on 

Cybersecurity while traveling
When getting ready to go on a vacation or business trip, it is important to keep in mind that you are still a target for cyber criminals.
Here are a few tips to keep you safe during your travels:
  • Back up the information on your computer before you travel. That way if you lose your equipment, you won’t lose all your information.
  • Carry your portable device in an inconspicuous bag. Flashy, branded or logo bags and expensive cases draw attention to your device. Remember to never leave your device unattended.
  • Keep in mind that Wi-Fi networks in public places like coffee shops, libraries or airports are not secure. Never send personal information through public Wi-Fi and disable the connection when you’re not using it.
  • Don’t announce in online status updates when you’re going away on vacation, when you’ve made a big purchase or events that mention your address. You may also want to delete online posts from friends who mention these things to avoid the possibility of your home being robbed while you’re away.
  • Be aware of the risks when tagging the location of the photos you share on social media. This lets people know where you are. If you feel the need to tag the location of a photo, a safer option would be to post the photo with the tagged location after you’re safely home.




Comments     Permalink     Add Comment

Cyber Safe: The Internet of Things at Home
by FCNB on 

Cyber Safe: The Internet of Things at Home


Internet of Things (IoT) in the Home

  • Entertainment systems including a television, gaming system, speakers and headphones
  • Heating and cooling systems such as the a thermostat, ceiling fan, carbon monoxide detector and smoke alarm, and lights
  • Home security systems including alarms, smart locks, garage door openers, baby monitors, cameras, and home assistants
  • Smart home appliances like a refrigerator, coffee maker, oven, and vacuum

loT on the Go

  • Connected smart cars, buses, trains, and airplanes
  • Wearables like a fitness tracker, watch Healthcare devices like heart and blood pressure monitors are converting to smart devices as well. Even your pet can be connected with a tracking collar.

How IoT technology works

Web-enabled smart devices transmit information gathered from their surroundings using embedded sensors, software and processors. Smart devices communicate with one another (machine to machine) or with us through our smartphones. After initial setup, most smart devices work automatically, collecting and sending information.

Why IoT is popular

Because of the automatic nature of the IoT, smart devices have many advantages. Coffee starts brewing when your alarm goes off in the morning. Your child forgets their keys, but you can unlock the door from work. You can remotely monitor your home and your family to keep them and your belongings safe. You can streamline your home's functions to make things run more efficiently. The IoT can change how you organize and schedule, and adding convenience and connection.

What are the risks?

With the automatic flow of information and connection between IoT devices comes a new set of cyber security risks. If you can access all your data remotely, a cybercriminal might be able to as well. The very nature of the IoT is connectivity, but with so many devices on one network, hackers could have multiple access points to your information. That's why security settings can be important. For example, a thermostat connected to your home network that is not properly secured could be a gateway to your identity, money, your address and other devices.

Not only is a breach of information a risk, but also someone taking control of a device and its functions. For example, someone hacking your smart lock system may not steal information, but they may be able to unlock the doors and steal your belongings.

How a cyber attack works

Using malware, hackers can turn devices into remote-controlled "bots”. These “bots” can be used to spread viruses and other malware, and even conduct a distributed denial-of-service (DDoS) against other systems. Once compromised, a device's camera and microphone can also be used by the hacker. In fact, some baby monitors, children's toys, as well as certain insulin pumps and pacemakers have been shown to be hackable. An added concern is that some manufacturers of smart devices reserve the right, in the terms and conditions, to store data and share it.

Protect yourself: #ConnectSmarter with the IoT

As more and more everyday objects become connected IoT devices, there are simple things you can do to protect your privacy and security:

  • Change the manufacturer's default user names and use strong passwords for your Wi-Fi network and smart devices. Don't use anything that could be associated with your name, address or phone number.
  • Enable a lock-screen password on devices.
  • Use up-to-date security software on your home computer and connected devices. Update operating systems of all your devices.
  • To limit the damage of a cyber-attack, separate your IoT devices from your main network. Ask your service provider for help to create a ‘guest' network for your IoT devices.
  • Understand what personal information is being collected and why it's needed before you buy IoT devices or download apps.
  • Turn off geolocation when it isn't needed; if an application can see your location, a hacker could too.
  • Set the camera and microphone off when you are not using it.
  • Maintain good cyber security practices (e.g. don't open attachments from people you don't know, don't use automatic login, etc.)

*Blog post from Cyber Safe, for more information visit: https://www.getcybersafe.gc.ca/cnt/rsks/ntrnt-thngs/hm-en.aspx 



Comments     Permalink     Add Comment

Encrypted Flash Drives
by FCNB on 


Encrypted Flash Drives


It can be very easy to lose a flash drive or external hard drive, especially if you are a frequent traveler.


One sure way to protect your lost data from getting into the wrong hands is to store it on an encrypted flash drive/hard drive.


Hardware: A number of manufacturers make secure flash drives that come equipped with a physical pin or fingerprint scanning.


Software: You can use software to encrypt your external drives, making your files inaccessible to anyone without the password.

Always make sure to do your research on any products before purchasing.


You should also be careful what you plug into your computer. Never use a USB if you don’t know where it came from or what might be on it! It can be infected with malware that can even resist formatting. Don’t let curiosity get the best of you.


Learn more about Frauds and Scams

See all Cybersecurity tips

Learn more about how to Get Cyber Safe



Comments     Permalink     Add Comment

How to talk to your kids about cyber security
by FCNB on 

How to talk to your kids about cyber security

Just about everyone is online these days, including most teenagers and a growing number of young children - never has technology been so accessible, Whether it be Snapchat, Facebook, Instagram or playing games on mobile devices, cybersecurity is becoming a concern for parents. Not only does this easy accessibility make your children vulnerable, it can also expose your computer and personal information to data breaches.

One of the best ways to protect your children from cyber threats is to educate them about the dangers and teach them to be safe online.
Here are a few tips to get the conversation started:

  • Talk to them about what is safe to post online and what’s not.
  • Tell them to only accept friend requests from people they know and trust.
  • Explain that browsing to an unsecured site (http) can disclose any information being sent. It is preferred to always go to the https version of a website, if available.
  • Teach them about strong password and how to properly manage them.
  • Teach them to never leave their device unattended. You can also set passwords for their devices and set them to auto-lock after a short period of time.

Additionally, here are some things parents  can do to protect themselves:

  • Keep a clean computer
  • Keep your browser and antivirus up to date
  • Be aware of new frauds and scams: Being aware of the type of fraud that is targeting New Brunswickers is the first line of defense of fraudsters. Teaching your children the red flags of fraud can help avoid being scammed in the future.
  • Never save your credit card information: Since most children do not have a credit card, you may think they aren’t the target of financial fraud. However, if you have a family computer, their online activities could bring on a cyberattack. Make sure to never store your credit card information, not only does this keep you safer from card fraud, it also keeps your children from buying unauthorized purchases.
  • Make it Custom: when downloading software, look for the ‘custom installation’ feature. Even the most trusted companies can leave you with more than you bargain for. This will give you the opportunity to remove any extra unwanted add-ons.



Comments     Permalink     Add Comment

Password Management
by FCNB on 


Password Management

 

It is expected that by 2020, the average Internet user will have more than 200 online accounts. Much to the delight of cybercriminals, this is one of the main reasons why passwords like “password123” and “qwerty” are so popular.

 

By using brute force or social engineering tactics, hackers can easily break into accounts guarded by weak passwords and steal whatever information they find.

 

The good news is that you do not have to choose between convenience and a strong password. A good password management tool helps you create and store highly secure passwords and easily enter them when needed. Do your research to find a product that is right for you.

 

Learn more about Frauds and Scams

See all Cybersecurity tips

Learn more about how to Get Cyber Safe


Comments     Permalink     Add Comment

Wi-Fi Safety
by FCNB on 


Wi-Fi Safety

 

Information being transmitted over unsecure Wi-Fi (like in a hotel lobby or coffee shop) is vulnerable to being hijacked. Any information that you are sharing from your device particularly if you are using an unsecure connection could be obtained by cybercriminals.

 

Be cautious when using public Wi-Fi networks as they are not always secure. It is safest to use trusted Wi-Fi connections that are password protected. Turn off any feature which connects you to any open network.

  

Set up a guest Wi-Fi network

 

Do you have family coming to stay? Are your kids’ friends constantly around? If you find yourself regularly playing the role of host, you may want to consider setting up a guest Wi-Fi network. This will allow your guests to connect to the Internet without giving them full-access to your home network. This helps reduce the risk of malware spreading and it limits what information your guests can see.

 

You can set up a guest Wi-Fi network in the settings of your router, once you have logged in as an administrator, look for guest Wi-Fi network setting under “Guest Zone” or “Guest Access”, and follow the setup instructions. Please note that not all routers have this feature.

 

Learn more about Frauds and Scams

See all Cybersecurity tips

Learn more about how to Get Cyber Safe
Comments     Permalink     Add Comment

Don’t be an April Fool
by FCNB on 


Don’t be an April Fool

 

Be prepared, back up your files on March 31st.

 

What is backup? A backup is a second copy of all your important files – for example, your family photos, home videos, documents and emails. Instead of storing it all in one place (like your computer), you make another copy of everything and keep it somewhere safe.

 

But why should I backup? Losing your files is much more common that you’d think. Have you ever lost your phone or camera – devastating, right? One small accident or failure could destroy all the important information you care about and may need.

 

How do I backup? There are two common ways of backing up your files: to an external drive, or somewhere on the Internet. It’s really easy and you only need to set it up once.

 

Learn more about Frauds and Scams

See all Cybersecurity tips

Learn more about how to Get Cyber Safe


Comments     Permalink     Add Comment

March 27 is SCRUB Day
by FCNB on 


March 27 is SCRUB Day

 

When did you last look over your social media photos and friends list?  On March 27th, participate in Get Cyber Safe’s SCRUB day.

 

To “SCRUB” your social media profiles, simply do the following steps:

 

Set privacy options

    • Limit the privacy setting on your social media profiles to limit who can see your posts and photos.


Change passwords

    • Practice good password management. Learn how by reading our post on creating strong passwords here.

Remove inappropriate posts

    • Delete posts that reveal personal information that could be used to harm you.


Untag photos

    • Untag yourself from photos you don’t want on your profile and ask the person tagging you to delete them.


Block strangers

    • Block follower requests and messages from people you don’t know. They may be fraudsters trying to steal your personal information.

 

Learn more about Frauds and Scams

See all Cybersecurity tips

Learn more about how to Get Cyber Safe



Comments     Permalink     Add Comment

Smart Home Safety
by FCNB on 

Smart Home Safety


Hot new gadgets claim to make your home smarter, more efficient and secure. In fact, if not properly secured, these devices can be turned against you. In November 2018, a woman was stalked by her ex-boyfriend using their smart home technology.

CBC Marketplace did an episode on how easily your security cameras, keyless door entries, virtual assistant devices (Alexa) and even baby monitors can easily be hacked if not properly secure.
We are not trying to discourage you from having these devices in your home. Our goal is to motivate you to take some security steps to ensure these types of devices are safeguarded against hackers.

The first step is to ask yourself the following questions:

  1. What are you using the devices for?
  2. Do you feel comfortable putting a camera in your home?
  3. If this technology becomes compromised, what are the risks to you and your family?
  4. What are the security measures?

Before purchasing any devices, make sure that the product is purchased from a reputable company, that they allow you to change the default password and a bonus to look for would be the ability to use two-factor authentication.

How to secure your smart home devices:

  • Create a strong and unique password for each of your devices. Do not repeat the password. Choose a password that is over 16 characters long, that has special characters and would not be easily hacked.
  • Change the password to your Wi-Fi and router.
  • Learn to spot phishing emails. Hackers are smart and could try to retrieve your password by sending you an email that looks like it’s being sent from your security camera’s company.
  • Enable two-factor authentication when available.
  • Consider installing a separate router dedicated to just your IoT devices for even better security. Alternatively connect them to a separate subnet (such as a guest network if your router permits it).

It is up to you to learn how these devices work and how to secure them properly.


Comments     Permalink     Add Comment

 
RSS Feed


2017 © Financial and Consumer Services Commission