Cyber Attack

Follow these instructions

At work, strictly observe safety rules and procedures laid down by your employer. Here are a few basic instructions:

  • Do not disclose your passwords to anyone;
  • Avoid using a personal USB key or external drive for purposes of work;
  • Always lock your work station when you leave, even for a short time; and
  • Report any suspicious incident to the person in charge of computer-related security.

At home, the following steps can prevent or reduce the impact of a computer-related security incident:

  • Make sure you have up-to-date software, anti-virus software and a firewall;
  • Check whether your computer and network are securely configured. If needed, request the help of a specialist;
  • Create long and difficult-to-guess passwords that include numbers, upper and lower case letters, and special characters; and
  • Do not disclose your passwords to anyone;
  • Do not use the same password twice and change it regularly;
  • When registering with a website or for Web service, make sure you choose security questions the answers to which only you know should you forget a password;
  • Avoid clicking on hypertext links in unsolicited emails;
  • Before opening email attachments, make sure you know what they are;
  • If you decide to answer emails from persons or organizations unknown to you, avoid providing personal information;
  • Consult only reliable sites, i.e. sites of known organizations. To help you identify counterfeit sites, pay special attention to the spelling and overall visual appearance of the sites;
  • Carry out your transactions only on secure sites. Secure websites have an Internet address that starts with “https” or have a padlock or lock icon on the page; and
  • Be careful when providing personal information.

Ensure that your mobile communication devices (smartphones, digital tablets, etc.) are secure at work and at home:

  • Activate the automatic locking feature after a period of inactivity or when the device is not in use;
  • Adjust the security and confidentiality parameters before downloading and installing applications;
  • Download applications from reliable sources. If you won't be using an application again, delete it;
  • Make sure that the operating system and applications are kept up to date;
  • Be extra careful if you use public or unknown wireless networks; and
  • As needed, use software that enables you to remotely monitor and lock your mobile devices, or even to modify or delete content.

Since mobile devices are replaced often and may contain sensitive information, follow these recommendations before disposing of a device:

  • Erase the data by wiping the device using the reset option; and
  • Transfer the Subscriber Identity Module (SIM) card, external card, or Secure Digital (SD) card, if the device has one, to the new device. Otherwise, make sure it is unusable.

Source and reference for further information: Urgence Québec – Cyber attack



72h_banner.jpg