%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 18 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240626075442+00'00') /ModDate (D:20240626075442+00'00') /Title (Report 06-2024) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R 16 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 6137 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 180.857 521.469 565.877 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 181.232 520.719 565.127 re S 0.773 0.773 0.773 rg 61.016 196.607 m 550.984 196.607 l 550.984 197.357 l 61.016 197.357 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(LOSE YOUR CELLPHONE, LOSE YOUR INFO)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(January 01,1970)] TJ ET BT 173.588 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 188.096 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.000 0.000 0.000 rg BT 61.016 637.420 Td /F4 9.0 Tf [(If you lost your cellphone today, what would a criminal have access to? Your smses? Your banking details? Your private )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(documents saved in your e-mail? Or sensitive work documents even?)] TJ ET BT 61.016 606.442 Td /F4 9.0 Tf [(And yet, we carry this invaluable information with us every day. We absentmindedly wander around talking in public while )] TJ ET BT 61.016 595.453 Td /F4 9.0 Tf [(we're within reaching distance of any opportunistic criminal. But there are also other ways to access information on your )] TJ ET BT 61.016 584.464 Td /F4 9.0 Tf [(phone by means of spyware and other suspicious software.)] TJ ET BT 61.016 564.475 Td /F4 9.0 Tf [(We use our cellphones more and more to organise and plan our lives and at the same time, make ourselves more )] TJ ET BT 61.016 553.486 Td /F4 9.0 Tf [(vulnerable.)] TJ ET 0.153 0.153 0.153 rg BT 61.016 534.997 Td /F4 9.0 Tf [(However, there are a few measures you can take to ensure you don't become a victim. 1. PASSWORD OR PIN This is )] TJ ET BT 61.016 524.008 Td /F4 9.0 Tf [(your most important first line of defense. Without a PIN or password, anyone can get hold of your cellphone, access your )] TJ ET BT 61.016 513.019 Td /F4 9.0 Tf [(e-mail, bank details, sms and personal information. )] TJ ET BT 266.594 513.019 Td /F4 9.0 Tf [(And Microsoft's head of online )] TJ ET BT 61.016 502.030 Td /F4 9.0 Tf [(security agrees."Using a PIN or unique password is the single most important thing to do )] TJ ET BT 61.016 491.041 Td /F4 9.0 Tf [(as a user of a smartphone to protect the device, the data and your reputation." According )] TJ ET BT 61.016 480.052 Td /F4 9.0 Tf [(to Beauchere the data on your phone is also more recent than the data on your desktop or )] TJ ET BT 61.016 469.063 Td /F4 9.0 Tf [(laptop. This increases the risk even more. Last year Microsoft conducted a worldwide )] TJ ET BT 61.016 458.074 Td /F4 9.0 Tf [(online survey regarding the usage of PINs. 10 000 desktop and mobile device users from )] TJ ET BT 61.016 447.085 Td /F4 9.0 Tf [(20 countries took part. Only 28% of these used a PIN on a device. 2.CELLPHONE APPS )] TJ ET BT 61.016 436.096 Td /F4 9.0 Tf [(Be very careful which apps you download and where you download them from. It's great )] TJ ET BT 61.016 425.107 Td /F4 9.0 Tf [(having an app to streamline your life or one to entertain you, but weigh the pros and cons )] TJ ET BT 61.016 414.118 Td /F4 9.0 Tf [(against each other. Even if an app looks nifty, rather download a similar one from )] TJ ET BT 61.016 403.129 Td /F4 9.0 Tf [(renowned app shops like iTunes, Google Play and Amazon. So some research. Read )] TJ ET BT 61.016 392.140 Td /F4 9.0 Tf [(other readers' comments, how they rate the app and if they experienced any problems )] TJ ET BT 61.016 381.151 Td /F4 9.0 Tf [(with it. 3. DUBIOUS LINKS According to research people are 3 times more likely to click )] TJ ET BT 61.016 370.162 Td /F4 9.0 Tf [(on a link on their phone than one on their PCs. The fact that the screen is smaller and )] TJ ET BT 61.016 359.173 Td /F4 9.0 Tf [(dubious links not as easily recognised could be the reason. Be suspicious of request for )] TJ ET BT 61.016 348.184 Td /F4 9.0 Tf [(personal information you receive via links in sms, e-mail or social networks. By clicking on )] TJ ET BT 61.016 337.195 Td /F4 9.0 Tf [(them, you run the risk of identity theft. 4. UNPROTECTED WI-FI When you use an open )] TJ ET BT 61.016 326.206 Td /F4 9.0 Tf [(WI-FInetwork in coffee shops, malls and other public places you information isn't securely )] TJ ET BT 61.016 315.217 Td /F4 9.0 Tf [(sent through the air. Any other person can intercept it during transmission. If you have to )] TJ ET BT 61.016 304.228 Td /F4 9.0 Tf [(do banking on your phone or work with sensitive information, rather wait till your at work or )] TJ ET BT 61.016 293.239 Td /F4 9.0 Tf [(home and have access to a secure WI-FInetwork. 5. )] TJ ET BT 274.109 293.239 Td /F2 9.0 Tf [(SPYWARE)] TJ ET BT 319.118 293.239 Td /F4 9.0 Tf [( Without a password )] TJ ET BT 61.016 282.250 Td /F4 9.0 Tf [(cyber criminals can load spyware on your phone and track your sms records, e-mails, banking transactions and location. )] TJ ET BT 61.016 271.261 Td /F4 9.0 Tf [(To prevent this from happening, activate a password or PIN on your phone or download an app from a reputable store to )] TJ ET BT 61.016 260.272 Td /F4 9.0 Tf [(scan for and remove spyware and viruses. If you'd like to read more on cellphone security, )] TJ ET 0.373 0.169 0.255 rg BT 422.888 260.272 Td /F4 9.0 Tf [(wikipedia)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 422.888 259.121 m 459.896 259.121 l S 0.153 0.153 0.153 rg BT 459.896 260.272 Td /F4 9.0 Tf [(has extensive )] TJ ET BT 61.016 249.283 Td /F4 9.0 Tf [(information. )] TJ ET BT 341.455 229.294 Td /F4 9.0 Tf [([SOURCES: )] TJ ET 0.373 0.169 0.255 rg BT 393.466 229.294 Td /F4 9.0 Tf [(www.rd.com)] TJ ET 0.18 w 0 J [ ] 0 d 393.466 228.143 m 442.966 228.143 l S 0.153 0.153 0.153 rg BT 442.966 229.294 Td /F4 9.0 Tf [(,)] TJ ET 0.373 0.169 0.255 rg BT 445.468 229.294 Td /F4 9.0 Tf [( www.computerworld.com])] TJ ET 0.18 w 0 J [ ] 0 d 445.468 228.143 m 550.984 228.143 l S 0.400 0.400 0.400 rg BT 61.016 210.805 Td /F2 9.0 Tf [(Posted in:E-mail,Security | Tagged:Mobile Security,Security | With 0 comments)] TJ ET q 128.250 0 0 225.000 422.734 296.810 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 422.8877 259.4392 459.8957 268.5967 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://www.wikiwand.com/en/Mobile_security) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 393.4663 228.4612 442.9663 237.6187 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (http://www.rd.com) >> endobj 16 0 obj << /Type /Annot /Subtype /Link /A 17 0 R /Border [0 0 0] /H /I /Rect [ 445.4683 228.4612 550.9843 237.6187 ] >> endobj 17 0 obj << /Type /Action /S /URI /URI (http://www.computerworld.com/article/2497183/mobile-security/mobile-phone-security-no-brainer--use-a-device-passcode.html) >> endobj 18 0 obj << /Type /XObject /Subtype /Image /Width 171 /Height 300 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 18989>> stream JFIFC?|)'㘴1Jwk$q,qGDD@P*@ s7@Wφ_M_G3 G; H_rs~uqGۚw} 쿯e ð_g+0ð_g+0'i?=x] vS %|vW %@W>$SX%k;MJ?7^.maִ/PaGz~݉a/D׿n?.rn}EvW %=a5"_/dW3F{C_~w_y/; HG; H^,xŸ_KCM+|Msľ񶗨x3nj<j:njڷ~Lm4/iDŽG}@ֵ?S??]CӲ>a5?"W/`(a5?"W/`+N?Ew/,/}/&#KE/ <=_Uo|I;\r~ pHHHWUaO۩_'ӧ鞔zgoC}xEw/,/]4~Οwᕖd?fcƍ|Hӣx ՚\}j(U3/_joo^jmEhZ૭kEGX7C_i|%_o?$/u4MVmO~2ХW|G jZfyuN|E~̷u_!Ri2{>\ lWw#ϥ<~$r|sX-ݿɽ/MY?9ge^!ּ1w?y| ྷmk |{AAokoHomjzn hGM?;~<\|z; 4 P房|}6<?ek1Ϣx&ǝ vOkv7~KiAc4T4]( * ~|C.xk&G#ԟi:OZEÓH~|G#&X1N^h8?tc@~/Ƿfoɽ0=GlE|/'gNJ?B?k^,H|G]ko/#Jςe#Oҭ]-\O @C7~i0=ھ [F AG&_R7_[ק;z}bf}φǿ—7_ e.p5=Q E>u0f}ZnjZ&k6cyjFgj^o%X]5^Y-ͼC4om߲:W'Z]QZ'?iړÞ,aAB˧aiZfi6V K G&_R7_޷ǿ.}kL4{O/)G%uewp~nu'&_R7__߯[{Q 7 oOj5y}Z+Gy}g?͇~x?.u={^45 2Z߉|ecӴ[m[^lwip$ῼ& c/)w/ Ln&ǯ:?ח ǧOٟsῼ&;pߓ|/ G&_R7_[@s}FǷfoɿ¾ [F q{ ?/x:] Ӫ^V9YB Ն[YG*3+vpr0r# gu|gw %g7Q-?gktO2|% >|C_ý%_21NNH&HMiCL?FǯݿHzܧtz9WßL,õ?\1/T=`~CWܼ?7_ߵ ~C{[l(_ ~]s F}}G_}ϡ~>?gf@cb ~gA@=3n=>\<\xҗCC?4 LV9G>{PsM{߇O>?ր=w}q2s׿v{w^}_<}_+ր;sߟ?4`]'?ſsOo^ip}_.t{v>?Ls^1Gɼ|z$_v#\?z}oo=u/K}wr=Ec~Xzɿzºz)_5;<|N29DÃ+y_ ;/E _~wU_7ۮ~kU}3T_7YG_up~F Q&7&u+Dzy}n>ϥ|5;S 7OP~=H>_AQz/NsvNzW?}?11gH:_t`vo\_~7 "0~==}F}Ϸw_'ӯ뎔}vW=w>`18g_'4=Kh=?oh0=W_"˷u?:f?T`}?,czgޙ?.\_S@ v?=Y=?qwS?qO^(?y?h9^1Gɼ|z$_uFx??E){wN??s@v?fo;{\WvӏN9Xy?o?DØ1k tQz/N?kM'vj??J*9SKfݻzѨ O=pays67%s=}}BcFa5?9ݿH_r`nGe!0=Go~?g+ ƿf\}"~=wo_׶ |1? G-6{98 ޺}wQǮA>ɥgߗ N?ϗG˥?>t`z>޿Z_oq=ۧ@Ta}}(߿vO {v^M=?_KׯwqG?~oqD_.qEx3ǮRkJ;{zkh<|z$_v#\nϯc~,~<Ϳ{_@qO_?XzɿN9:}z>= ;/E M'훏oO5~~UߟOV+M/v?j?@5p~FO'LoL~`?Ҿ87޾ayٍɟy_rǶ?N???J_|{ $FWw^3?_9(}F}ѕ?q;uǧ"{9?J3t\[z/Ǣ]|Oz3z/\{t+;z_3;SF}?|{1Fx?=h^?wШv94q迧FsqӶh{wQǢ]Όۜ|{_#?)v$kq^џoҼc'H.#=hN#ciɿ?xs?Aۮov_M|'ŏ٧8_3zQz/8_4o۷O5~_ֿʫGٿn?De3Yj<DJǦ}z_L,õ?_cg??_)z?ߡ֠7z~k?ٟP>?f,?}с1g=?fts߯I>7z޿W:|K~N>>挷٤w<18}{'׾/_OZN}Ҍ^g/@ ϣwFO>]/{z\\u3 $_◯oE{F]O5xE)qЏ(N 4z:_+}n 46s]xo=q_@qsӏ՚ѿ&M/vG_fW;+|lջzѨ O=pays67%{'{~X5)= O'O13?@?}vu_?_Ჿ< ~̿!k=k\Xuȯg?Ჿ< ~̸DB?/dP3\Stswۥ_A߰c(OO7(tq迒tq@|0}Oo?Q迒t|n9?O}O4|sX⏗wlP=|̣{v_N#%9"Oÿގ=_.E3 $_g\sֽ^ޟzCx/K}su>'gciɿct㏯n+829N9E>hv^ϙ_U#i?lջzѨ U%M'mۦ?~Q3zG&j<d}A;{dkRN^1+&ڟO,&7%0Ҿ;O^Ge z+e@xF_ao_+_ 52 _@ϹsϵoC=G>h2}}?ޗ~?z9{}Iw.zާg?u?zL{>އӿzWzLxpQ۷6z޾G>@>~ѓaG>~stgv?z9<<|z/KPw'Ǒ^z޿Og\"{x#]k'ŏ٧9zM}~|q_?ۿ?f_'^k}}ϡ=}?(&}?.ҿʫGٿn?VU?r?vQ\7~&{/_џj<ɍɝ3uܟZ=GNW}Jk ;S ?OP~X5)oF튂_u}:~_ ~f\8_R9۴NA\2c_ f@?DFǧ\yџs]ׯۺ=>>M}~ N?~{◟S?G>g;8g_&}}:~O?F>h9g^}'>z>\R~`2h>}8c8g_'4~s=gxg]1 _uF_N>\ki>=rR$kc~XzɿN9ןqx29'^c_@s>_Ǯ;~BqOoVkM'vj?>O)ݽ~W ߧꉞg80j<oK?{N^~]|5j<1/?c)kczz_?|/? c>=q~߷vק_~6g ?f.篨4>>(=Oǿwnϯ_4]zwlP0z8"?ÿڗOo^h8">Q;s}Iǿo`a}}Oz?/qK:޿}}hOׯ8?q?$Og?/Ҏ?~q|_'4ך0=Go~??R?{߯x!g]S$kۿOZXy9DÞJ㞟?d,~=wo'^^޹}~n?Jz*9SIfݻzѨ UͿ*9SKfݻuP \7~&{/_џO'˟/P?}G_g5loL?xI}OoAPTv^vV?þzt#_5>Wge@N:_ '=2s~'FSlF??=hϷ?JLa {q.Ad~Czۯ>ϿA(>[?@?n.=?玙syK׿u&~_Nv;ODё:.?#sd~CsϦ2=O"vϷZ<<|yR#Y*<<|y/K#\O 8,~?/N93k zɯd4ٿu=u5?/ӊo>4oo7oe~d~޿v=L*9 Ifݻ( ʮO=qag?c_fCЊO?=&?ڟO.d~׷j ~Bk6W_&~ _|N2kL/1_ ~e@y"7>lϩi09w? ?:c=hy?Ɠ#{j_O4sٿӯ'|0=}?}P~?Nhi0|GB`zqy=7^hOI鞴q|_O4~'j8>].zvo^/H $_H1B9g=n?x_w~@p?O'Mxs_N^k8e٧u|z+=OwQz/_O5U?r?vQG{UO7G_\7~&{/_џj<ɍ}'1$uN0z%>Xj<ɍɝ?uǰNE?PTv^~=xk_Pz!k>݇l(C_.8?-sXO}ǩݿ÷On׃t_A߰c(qOO_?4z/Ǣ)8oq迒te}oO+8ݺ}N:Gݿׯ|2sO2{b[ӿ(M'osGzqҀ?4~&E;]O^{޿O^l?ݺogޟWkh?>=p3 _aBF?1'cci&s:߶:;澀wt9|'mXxo=?xs;zv/~BMO)ݺG_SoN_ֿʯG~ٿn?~W ߧꉞg80kS f7% zdkRNsTOYj\/>o]{>lt xH?B5{״|އ~=pq _◯ bW^=~ר{`q_?ۿ?f_'^k}}ϡ}?z@_J*9SKfݻ( ʿ[׿޿ʧGٿn~jQ3zG&S LoLW3q۩'Wܧ:zN8_ 0yrG` ~tDZH<3j_nO5'!ًFc{W8>_ 1ًőϹ.⏮;wNw4`{ݿMӞۥ?׊9"O9fȓ~s ~?ǂs]=:s_x_=2{րw^I~i?~)ϧ=3sہI(R~_=xs';O4v㾝?L׋1/KБ/^ϯ???rO\aG= 4?w_'^ԊӏfN2Ӄ6sݾxsӧ־#~C_W#i?lnQ+Uy"NWU_7G_5p~F O'O1/? WĮ:/N~LGUpseo7! |;SoHc|KM|4WVSFr>=No==xPTv^Goۨ"L kaGYv>%<E`Չ4#_ %xKE4l'Ӟ['@Y}}z~Gܷ\3>r?n?n_K_{~ֿ?_r\|^hǡo~[?ڝw/V] w/@/??O) /%kܸn^=Nw_ ._q;R_KOק?r?n~&~mWm{4>&7ZvHѴ_2nj^}Yj>&Kxm_zfޘ.D[}o_r ._q;R_KORùe|e7iZ\ϵR*/ \/h틬xCF5 |i2 [%&droھ/|DwgVxc>1tO/Ήr[_3ψhnGmJ3I7nb׿ ;[mջ[}<[( /oO}ùe/|eĴܾ{v~AF_]2˲|5G;R_KO}ˌ߈F~mQw_ ._q;Q^v5[&싩]麗.j~kqea{VVWwq<Vvp [$y'xVFe?wqo'펔~}?拾_pYv_w}'9?Ú|5Cs&J3D, 4>.'w xye0d=}9/֓.)9t0_*9SKfG_"W^ëz?ů+㟇>'Mff|qh>$kن\m|4|z借V-AxZ4!QҼGif4+goӷHއF[dsۺ>=foL>} wg3'W>G~3xzǎb}Z~V-|y/473^뺍95mOž,ՓSo:ji?ڻן+f?Mt|V>.x{~)/ŋ eRo|Tc'$ j/~!|,W|]oNtźG<)hzy_FॿZanl??n)]+%ݿcjG?o??_z?jG?o??_oFॿZaoF~9FॿZaoF4i|^W_K{ω?_ [O^{ ~uRmx3_xKzVĚOIw;M{vz7<%kO*߷ƿx1h~ 4[xwZ'_B$Ծ|@!zj^Ľ7OM?7-%> `ho;⯁%S?GMW]c_?/.tVO>"UWahGuoZiP r[xU?R?EӴCD??z,V^!ΉkwÈ#&>ҼéxVYÝ~#}ae~w6>Ӛg-yt MwП ^e{IIB[jmĺR{1=xl7>Wk|s |(|;kᗆ-#TuMrduh?Xh^.`Kuaɴڻ|d ϋ~ <,>:1kƁiK:M+>YuxPӴ y//aM{ WNv֗QŵAu`=WNZX_l WPm o=mKػ_[t?#C^;EO u'g E-u-*Mk~.7]jzu{Ee_i)u1Z{X6萝VQj^X ۭ2þΞ{hg[vP{vKe{[~,I~d[?}iK?.hg [EasF_5/yyy?~+]cok޹v?o x:͏t-gGïͮjZ~xJ𾽦xQoc|_-kĚO7{dWWg?~~?gHڞ? "K1:ȼo'/ _j~)w3xO~{__+=hIϷw_'ӯ뎕GU4LuoQG5m[T43OQo+[+ H(-idHј!GDooƿ|C#v6nP/V~qP._'Z{gRkz^a4/-i ~x+?|c_>2mO-ug~џB׏_uI |݅ǎ~jZ7Mť~xu*ĚW#:R==z |O~|bRXi7c}o]/L m Y.]ͽ'Ս_|75_`~c>1 E@xH/|= ǨYZujPlΗ2Zx/ѤvCw5Mĺ%N7Vۛ2c\ڴolcT=;H~v=K~]?Ke$hOw{_?R"O__?R"O_r.%2_|Ƽoχ'Rңth񗁼gN~xzN7h~ xik>>{ş?i٣b$k5? 7WWҼ_߲zx_%O|UG}SCǍa_]\HO <5~woa^*ԯ5xސ71417ׁH$U =Ѳ惙ZV4r~5|*ψu 6Vlz!lh-O_?X|aN㿏n:~"t ]N%TuY>i[Jբzև?m[ڲjuͯv8ϥݷC^GG*"""*TU(OOIEjPg$zR endstream endobj xref 0 19 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000332 00000 n 0000000369 00000 n 0000000507 00000 n 0000000603 00000 n 0000006792 00000 n 0000006904 00000 n 0000007019 00000 n 0000007139 00000 n 0000007247 00000 n 0000007375 00000 n 0000007469 00000 n 0000007597 00000 n 0000007666 00000 n 0000007794 00000 n 0000007967 00000 n trailer << /Size 19 /Root 1 0 R /Info 5 0 R >> startxref 27125 %%EOF security « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

security

Step Up to Stronger Passwords

Tuesday, October 5th, 2021

Weak and reused passwords continue to be a common entry point for account or identity takeover and network intrusions. Simple steps and tools exist to help you achieve unique, strong passwords for your accounts.

 A password is often all that stands between you and sensitive data. It’s also often all that stands between a cyber criminal and your account. Below are tips to help you create stronger passwords, manage them more easily, and take one further step to protect against account theft.

  • Always: Use a unique password for each account so one compromised password does not put all of your accounts at risk of takeover.
  • Good: A good password is 10 or more characters in length, with a combination of uppercase and lowercase letters, plus numbers and/or symbols — such as pAMPh$3let. Complex passwords can be challenging to remember for even one site, let alone using multiple passwords for multiple sites; strong passwords are also difficult to type on a smartphone keyboard (for an easy password management option, see “best” below).
  • Better: A passphrase uses a combination of words to achieve a length of 20 or more characters. That additional length makes it’s exponentially harder for hackers to crack, yet a passphrase is easier for you to remember and more natural to type. To create a passphrase, generate four or more random words from a dictionary, mix in uppercase letters, and add a number or symbol to make it even stronger — such as rubbishconsiderGREENSwim$3. You’ll still find it challenging to remember multiple passphrases, though, so read on.
  • Best: The strongest passwords are created by password managers — software that generates and keeps track of complex and unique passwords for all of your accounts. All you need to remember is one complex password or passphrase to access your password manager. With a password manager, you can look up passwords when you need them, copy and paste from the vault, or use functionality within the software to log you in automatically. Best practice is to add two-step verification to your password manager account. Keep reading!
  • Step it up! When you use two-step verification (a.k.a., two-factor authentication or login approval), a stolen password doesn’t result in a stolen account. Anytime your account is logged into from a new device, you receive an authorization check on your smartphone or another registered device. Without that second piece, a password thief can’t get into your account. It’s the single best way to protect your account from cyber criminals.

Resources

 

Compromised student account used for phishing

Tuesday, April 18th, 2017

Just because mail seems to come from a university address, doesn’t mean to say that it is legitimate.

The latest phishing scam making its rounds at the university is being sent from a compromised student account. The subject line is all in capital letters and is meant to frighten you into clicking on a link and filling in your details. This is probably how the student account that is now sending it was originally compromised.

This is a typical phishing scam. Do not respond or click on any of the links. Many thanks to all the observant students who picked it up and pointed it out to us.

Below is an example of the mail (with the dangerous bits removed)


 

From: Compromised, Student account <12345678@sun.ac.za>
Sent: Monday, 17 April 2017 12:19 PM
To: fake@email.address
Subject: YOUR EMAIL ACCOUNT HAS BEEN COMPROMISED

 

Certify Your email HERE


[ARTICLE BY DAVID WILES]

Don’t Be Fooled. Protect Yourself and Your Identity

Wednesday, April 5th, 2017

According to the US Department of Justice, more than 17 million Americans were victims of identity theft in 2014. EDUCAUSE research shows that 21 percent of respondents to the annual ECAR student study have had an online account hacked, and 14 percent have had a computer, tablet, or smartphone stolen. Online fraud is an ongoing risk. The following tips can help you prevent identity theft.

  • Read your credit card, bank, and pay statements carefully each month. Look for unusual or unexpected transactions. Remember also to review recurring bill charges and other important personal account information.
  • Review your health insurance plan statements and claims. Look for unusual or unexpected transactions.
  • Shred it! Shred any documents with personal, financial, or medical information before you throw them away.
  • Take advantage of free annual credit reports. In South Africa TransUnion, Experian and CompuShare can provide these reports.
  • If a request for your personal info doesn’t feel right, do not feel obligated to respond! Legitimate companies won’t ask for personal information such as your ID number, password, or account number in a pop-up ad, e-mail, SMS, or unsolicited phone call.
  • Limit the personal information you share on social media. Also, check your privacy settings every time you update an application or operating system (or at least every few months).
  • Put a password on it. Protect your online accounts and mobile devices with strong, unique passwords or passphrases.
  • Limit use of public Wi-Fi. Be careful when using free Wi-Fi, which may not be secure. Do not access online banking information or other sensitive accounts from public Wi-Fi.
  • Secure your devices. Encrypt your hard drive, use a VPN, and ensure that your systems, apps, antivirus software, and plug-ins are up-to-date.

 

Salary increase e-mail not quite good news

Tuesday, April 4th, 2017

Several of our observant personnel have picked up that a very suspicious e-mail is making the rounds at the moment.

The subject is “NOTIFICATION: Your 13.69% Salary Increase”. 

This is a very dangerous e-mail. Clicking on the link will take you to a forged version of the SUN e-HR site. If you enter your username and password (because the site looks like the SUN e-HR site), the criminals will have been given access to your personal details on SUN e-HR. The ramifications of this will mean that the scammers will potentially be able to get details such as your banking details, ID number, place of residence, that are all stored on the SUN e-HR system. They will potentially then be able to steal your salary.

The e-mail contains the following message:


Hello,

Attached herewith are two (2) documents summarizing your April salary as reviewed for a 13.69% merit increase in Financial Year 2017.

This review is with immediate effect starting Friday April 28th Paycheque.

Deductions and bonuses are advised therein

The documents are attached below:


 

Below is what the forged site looks like. The address is not a university server BUT very few people notice such details and tend to skim over them.

 

[ARTICLE BY David Wiles]

Office365 phishing e-mail

Friday, March 3rd, 2017

Please take note of a phishing e-mail circulating on campus which looks like an Office365 e-mail notification. Unfortunately, a few students have been caught out by this trap. 

We will not send you an e-mail resembling the one below. If in doubt, rather contact us to confirm whether it’s a legitimate request.

 


From: SU Student <phishingvictim@sun.ac.za>
   Sent: 03 March 2017 12:07 PM
   Subject: Missing Mails

   You have two(2) unread messages but cannot because your mailbox has
   exceeds its quota/limit.
   Click here to use the message retriever page and enter login again to
   access missing message.

   Secretary

   Office 365

   System Administrator

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.