Police Advice On Cybercrime & Online Safety

Cybercrime covers all crimes that take place online, are committed using computers or are assisted by online technology. Anyone can become a victim of cybercrime. It’s estimated that nearly six million fraud and cyber-crimes are committed each year, with as many as one in 10 people falling victim.
 
To reduce your chances of becoming a victim:
• use a strong password or passphrase which is at least 12 characters long and contains a mixture of letters, numbers and symbols
• never give personal or sensitive details out online or over email
• make sure all devices have up-to-date anti-virus software and a firewall installed
• keep software and apps regularly updated
• only download from legal, trusted websites
• only open emails and attachments from known and trusted sources
• look for the padlock icon in the address bar when paying for goods or services online, this means the website is trusted and secure
• check the address starts with ‘https://’ whenever you’re asked to enter sensitive information online
• avoid using public Wi-Fi hotspots that are not secure or require personal information to be given
• regularly backup your data
• control your social media accounts – regularly check your privacy settings and how your data is being used and shared
• be cautious of Internet chats and online dating, there’s no guarantee you’re speaking to who you think. Be extremely cautious if you’re asked for money
 
Visit Cyber Aware for step-by-step instructions on keeping your devices up-to-date with the latest security updates.
 
Scams
Be careful when opening emails and texts, especially if they’re from an unknown sender. If an email or text is unexpected or seems unusual, even if it’s from someone you know, ignore it and contact the sender directly to check if they sent it.
Your bank, the police and other reputable companies will never contact you via email, the phone or by text message and ask for sensitive or financial details.
 
To protect yourself from scams:
• don’t open attachments or click on links in emails or texts from senders you don’t know
• never give out personal information, financial details or passwords in response to an email, when you receive an unexpected phone call or in response to a text message
• set up spam filters on all of your accounts
• don’t respond to emails or texts from unknown sources
• always go to a website directly, by typing out the address yourself, when logging into an account
 
Social Networking
Social networks are a great way of keeping in touch with friends and family, but be careful about how much personal information you choose to share. Once you post or share something on any social media platform it’s out of your control and could be shared and used by others, even if you delete it.
 
Make sure you:
• set your privacy settings to the highest level and check them regularly as updates can affect settings
• don’t add or accept ‘friend’ requests from people you don’t know
• where possible, block apps and social media sites from tracking and showing your location, and habits stop people you don’t know from following you
• think carefully about the images, videos and content that you share
• remember that if you wouldn’t do or say it in the real world, don’t do it online
 
How to Spot a Fake Website
If an online offer looks too good to be true, it probably is. There are a number of simple tips to help spot a fake site:
• Sense check the domain name
• Are the prices too good to be true?
• Never pay by bank transfer – legitimate sites will accept payment via usual methods, such as bank card and PayPal
• Check the Terms and Conditions, and policies are clear and fair
• Read online reviews of the company and its products to check for customer satisfaction ratings (Trustpilot, Feefo)
Backup your Data
Ransomware is a type of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
Ensure you save all your documents and photos in at least one other location to minimise the risk of losing everything if you receive a Ransomware virus. You can backup data on to a USB stick, an external hard drive or to a cloud server. Remember to regularly backup your data.
Tips for Parents and Guardians
The internet can be a valuable resource for children, allowing them to connect with friends and learn new things. But there are also dangers to going online, and children can be particularly vulnerable.
Talking to your child is one of the best ways to keep them safe online. By understanding the risks and keeping yourself up-to-date, on the latest technology, websites and social networks, you can help your child enjoy the internet safely and securely.
 
To help protect your children online:
• keep computers and games consoles in family rooms where you can monitor activity
• install parental control software or activate parental controls through your Internet Service Provider (ISP) to prevent access to inappropriate content
• ‘friend’ or ‘follow’ your child on social networking sites, so you can see how they are using them
• check they are old enough to join any websites or social networks with age restrictions
• advise your child not to post personal information or any images they wouldn’t want everyone to see
• check their social media accounts’ privacy settings. E.g. so their posts are only seen by friends and their location isn’t tracked
• avoid using webcams unless talking to close friends or family, and consider covering it when not in use
• monitor their usage and be watchful for any secretive behaviour 
• encourage your child to be open about what they do online and who they’re talking to
• insist you go with them if they wish to meet online friends
• ensure the games your child plays online are age appropriate
 
Thames Valley Police
 
You Might Also Read: 
 
Cyber Criminals Love The UK:
 
Cybercrime: Law Enforcement Must Get Serious:
 
« US Accuses Russia Of Interfering With Undersea Cables
China’s Electronic Surveillance Program Targets Muslims »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Trend Micro

Trend Micro

Trend Micro is a leader in hybrid cloud, endpoint, and network security solutions.

Cyber Security Academy - University of Southampton

Cyber Security Academy - University of Southampton

An industry/University partnership established to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.

Advanced Resource Managers (ARM)

Advanced Resource Managers (ARM)

ARM provide specialist recruitment services for technology and engineering including cyber security.

Repository of Industrial Security Incidents (RISI)

Repository of Industrial Security Incidents (RISI)

RISI is a database of cyber security incidents that have (or could have) affected process control, industrial automation or SCADA systems.

Appdome

Appdome

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

Intertrust Technologies

Intertrust Technologies

Intertrust Technologies is a software company specializing in trusted computing products and services.

Ziroh Labs

Ziroh Labs

Ziroh Labs leverages advanced cryptography to keep your highly sensitive, private data safe throughout the lifecycle of data.

RUSCADASEC

RUSCADASEC

RUSCADASEC is an independent non-profit initiative on developing the open Russian-speaking international community of industrial cyber security/ICS/SCADA cyber security professionals.

Rezilion

Rezilion

Rezilion is a stealth mode cyber-security start-up developing a cutting edge technology that makes cloud environments self-protecting and resilient to cyber-attacks.

Perygee

Perygee

Perygee is a fully integrated platform for operational security. Companies depend on Perygee to identify and streamline the most important security practices for their operations.

Etisalat and (e&)

Etisalat and (e&)

Etisalat Group is one of the world’s leading telecom groups in emerging markets.

Cybaverse

Cybaverse

Cybaverse (formerly North Star Cyber Security) was founded to create the perfect blend of a Managed Security Service Provider (MSSP) and a Cyber Security Consultancy in one.

Northrop Grumman

Northrop Grumman

Northrop Grumman is a global provider and integrator of complex, advanced and rapidly adapting information technology, cybersecurity, mobility and optimized services and solutions.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

Quantum Dice

Quantum Dice

Quantum Dice is an award-winning venture-backed spinout from Oxford University’s world-renowned quantum optics laboratory.