top of page

CSEC's Cyber October | Tips & Tricks

Updated: Jul 13, 2023

It's not by chance that Cyber Security Excellence Centre starts or kicks off in October. October, as a month dedicated to cyber security, was ideal for presenting CSEC and, at the same time, start to work on raising capacities and awareness about cyber security in Bosnia and Herzegovina. We invite all of you to attend our cybersec event at Hotel Hills on October 12th and help us spread the word.

That said, let us give you a couple of basic tips and tricks about cyber security and help you stay safe online.

Start using 2-step verification

Start from your e-mail or from online banking but do not stop until you reach your social networks like Facebook or Twitter. Enable 2-step verification (2FA) on all your apps and sites. Just this step makes you tenfold more secure. You can use different methods for login verification like SMS, email, voice call or authenticator app or token depending on the service that you are using.

Make your password more secure

Weak passwords can be hacked in a matter of seconds. To prevent cyber-attacks you need passwords that will be complex enough. Use a minimum of 12- character passwords with upper and lowercase letters, numbers, and special characters.

Make a password more memorable using a simple sentence. You can even use your favourite quote. For example, use the first two letters of each word, substitute some letters with similar numbers and ad a special sign in the mix: Never Forget Your Password Again! Gives us NeF0YoPa4g!

Create unique passwords for every account, from your email to your social media. A good idea is to use a password manager to keep them all in one place.

Roles and permissions

When you use collaborative online software or add contributors to your site, you should control access to sensitive information. On your Google Docs or Office 365 document, you can assign limited roles to your colleagues. Only assign a full rights role to a trusted collaborator who requires full control of your document.

Customize permissions for any platform or software you use, so employees and collaborators only access information and perform actions required for their work. By limiting access, you can prevent sensitive data and information from being leaked or stolen.

Recognise phishing attempts

Globally, over 90% of cyber-attacks start with phishing via email or message. Common warning signs are:

  • Typos and misspellings - Look out for typos like a misspelled email address, incorrect company name, or wrong date.

  • Links and attachments - Before you click links, hover over them to check their destination. If a message requires you to download attachments, it should raise a red flag.

  • Urgency - If an email or text says you need to act quickly, evaluate the message and sender before you do anything else.

81 views0 comments


Commenting has been turned off.
bottom of page