Correct threats through action by protecting your PC and other devices.
"High-tech crime is no longer the province of science fiction movies."
Former Victorian Police Commissioner Mal Hyde, Australian Federal Police
There are steps you can take to protect yourself from privacy threats, whether it’s the high-tech kind or someone watching over your shoulder on the bus. The first step is to be aware when your private information is visible to others and identify when your privacy is at risk. The next is to secure your computer, smart phone and other electronic devices. Finally, be vigilant when sharing your details online and don’t be afraid to ask questions if something doesn't look right.
Malware
Malware is software with a malicious purpose. It may be able to disable or remotely control your device, or retrieve your personal information.
The following suggestions are designed to reduce your exposure to malware:
Encrypt sensitive information stored on your PC
Encryption is the process of systematically encoding data before transmission and during storage, so that an unauthorised party cannot easily decipher the data. If you keep personal or financial information on your computer, consider taking steps to encrypt and protect sensitive files and folders.
The method of encryption will depend on the system you operate at home. Instructions for some commonly used systems are linked below:
If another user attempts to open, copy or move an encrypted file, he or she will be unable to do so without being given relevant access privileges.
What you need to know about email
Spam is a generic term used to describe electronic junk mail, that is, unwanted messages sent to your email account or mobile phone. Although there are exceptions, it can be illegal to send unsolicited commercial electronic messages. The Australian Communications and Media Authority (ACMA) is responsible for enforcing the Spam Act 2003 (Cth) and actively works to fight spam in Australia. The ACMA keeps a running feed on current scams and e-security issues facing Australians.
Phishing email messages are more sinister because they are designed to steal your identity. They ask for personal data, or direct you to websites or phone numbers to call where they ask you to provide personal data.
Microsoft offers the following clues to help you spot fraudulent email messages or links within them.
Cybercriminals also use web addresses that resemble the names of well-known companies but are slightly altered by adding, omitting, or transposing letters.
For more information about phishing and scams, visit ScamWatch.
Accessing your money online
Most Australian banks, building societies and credit unions operate in an environment of “bricks and clicks”, that is, they have traditional bank branches in key locations but they also offer internet banking. In fact, today you can use most of the banking facilities available to you in a branch through a bank’s website.
When banking is taken out of the safe domain of bricks and mortar branches, security must be a priority. Banks have taken steps to protect you such as securing log in pages through an encryption process, but as a customer, it is your responsibility to become familiar with your bank’s security measures. You can check the security of your exchange with your bank by:
Conducting transactions online is quicker and easier than ever before, but the privacy risks are ever-present. Online transactions can be monitored, recorded, and key logged by a variety of hackers and third parties without the knowledge or consent of the user. To mitigate the risks associated with online transactions:
Passwords
You can password protect all manner of technological devices and remote-access services. In doing so, don’t forget your phones and tablets—small, portable and full of personal information, these devices may pose a greater privacy risk than your personal computer.
Choose difficult passwords, memorise them and change them often. Avoid your mother’s maiden name and other commonly used passwords…
From the moment people started using passwords, it didn’t take long to realize how many people picked the very same passwords over and over. Even the way people misspell words is consistent. In fact, people are so predictable that most hackers make use of lists of common passwords. To give you some insight into how predictable humans are the following is a list of the 10 most common passwords. If you see your password on this list, please change it immediately. Keep in mind that every password listed here has been used by at least hundreds if not thousands of other people.
There are some interesting, but common, passwords that show how people try to be clever, but even human cleverness is predictable. For example:
If you’re concerned about being able to remember a complex code for a password, here’s a little memory-jogging trick: take a sentence and turn it into a password. For example “This little piggy went to market” might become “tlpWENT2m”.
Related links