Device security
If you’re using your laptop, phone or a computer and need to step out (for example, to go to the toilet), always make sure to take it with you. If you’re unable to take it with you, lock your device. This will prevent your device being accessed by someone if it is stolen.
Some devices also allow you to set it so it will wipe itself after a number of unsuccessful access attempts.
Always keep your devices with you when possible. Otherwise, always lock them when they’re not in use.
Back up data
Always back up your data to an external hard drive or cloud storage service such as your LTU OneDrive account, iCloud or Google Drive in the event of your computer is lost or stolen.
Keep programs up-to-date
Over time, bugs and glitches affecting computer programs and mobile apps get disclosed – some of which can allow a hacker to completely take over your machine.
Fortunately, these vulnerabilities are often patched quickly, but the onus is on you to keep your programs up to date.
Always keep your Windows/MacOS/iOS/Android and any programs up to date. Always download new versions when prompted.
Running foreign/untrusted programs
Most of the time, a hacker wanting to infect you with a virus or ransomware will rely on you to run an executable file they send to you. These can be identified as having file extensions such as .exe or .msi.
Never run executables from sources you don’t trust. Always verify the file and where it came from.
Opening macro-enabled documents
Hackers have recently resorted to sending Microsoft Word or Excel documents that have what’s called “macros” embedded in them. Macros are often used to automate things such as calculations, however they can also be used by hackers to download and run viruses and ransomware.
Macro-enabled documents can be identified by having the “.docm”, “.xlsm” or “.pptm” file extesion.
Never open a Microsoft Office document that has macros unless you are expecting to receive it and can verify the sender’s identity.
USB devices
Hackers’ attacks aren’t limited to the Internet. Infected USB storage devices are often used by hackers to spread viruses and ransomware. There are also USB devices that can steal your passwords or even overload and physically destroy any device it’s plugged into.
Never plug in a USB device that you randomly find or are given to from someone you don’t trust.