Police Advice On Cybercrime & Online Safety

Cybercrime covers all crimes that take place online, are committed using computers or are assisted by online technology. Anyone can become a victim of cybercrime. It’s estimated that nearly six million fraud and cyber-crimes are committed each year, with as many as one in 10 people falling victim.
 
To reduce your chances of becoming a victim:
• use a strong password or passphrase which is at least 12 characters long and contains a mixture of letters, numbers and symbols
• never give personal or sensitive details out online or over email
• make sure all devices have up-to-date anti-virus software and a firewall installed
• keep software and apps regularly updated
• only download from legal, trusted websites
• only open emails and attachments from known and trusted sources
• look for the padlock icon in the address bar when paying for goods or services online, this means the website is trusted and secure
• check the address starts with ‘https://’ whenever you’re asked to enter sensitive information online
• avoid using public Wi-Fi hotspots that are not secure or require personal information to be given
• regularly backup your data
• control your social media accounts – regularly check your privacy settings and how your data is being used and shared
• be cautious of Internet chats and online dating, there’s no guarantee you’re speaking to who you think. Be extremely cautious if you’re asked for money
 
Visit Cyber Aware for step-by-step instructions on keeping your devices up-to-date with the latest security updates.
 
Scams
Be careful when opening emails and texts, especially if they’re from an unknown sender. If an email or text is unexpected or seems unusual, even if it’s from someone you know, ignore it and contact the sender directly to check if they sent it.
Your bank, the police and other reputable companies will never contact you via email, the phone or by text message and ask for sensitive or financial details.
 
To protect yourself from scams:
• don’t open attachments or click on links in emails or texts from senders you don’t know
• never give out personal information, financial details or passwords in response to an email, when you receive an unexpected phone call or in response to a text message
• set up spam filters on all of your accounts
• don’t respond to emails or texts from unknown sources
• always go to a website directly, by typing out the address yourself, when logging into an account
 
Social Networking
Social networks are a great way of keeping in touch with friends and family, but be careful about how much personal information you choose to share. Once you post or share something on any social media platform it’s out of your control and could be shared and used by others, even if you delete it.
 
Make sure you:
• set your privacy settings to the highest level and check them regularly as updates can affect settings
• don’t add or accept ‘friend’ requests from people you don’t know
• where possible, block apps and social media sites from tracking and showing your location, and habits stop people you don’t know from following you
• think carefully about the images, videos and content that you share
• remember that if you wouldn’t do or say it in the real world, don’t do it online
 
How to Spot a Fake Website
If an online offer looks too good to be true, it probably is. There are a number of simple tips to help spot a fake site:
• Sense check the domain name
• Are the prices too good to be true?
• Never pay by bank transfer – legitimate sites will accept payment via usual methods, such as bank card and PayPal
• Check the Terms and Conditions, and policies are clear and fair
• Read online reviews of the company and its products to check for customer satisfaction ratings (Trustpilot, Feefo)
Backup your Data
Ransomware is a type of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
Ensure you save all your documents and photos in at least one other location to minimise the risk of losing everything if you receive a Ransomware virus. You can backup data on to a USB stick, an external hard drive or to a cloud server. Remember to regularly backup your data.
Tips for Parents and Guardians
The internet can be a valuable resource for children, allowing them to connect with friends and learn new things. But there are also dangers to going online, and children can be particularly vulnerable.
Talking to your child is one of the best ways to keep them safe online. By understanding the risks and keeping yourself up-to-date, on the latest technology, websites and social networks, you can help your child enjoy the internet safely and securely.
 
To help protect your children online:
• keep computers and games consoles in family rooms where you can monitor activity
• install parental control software or activate parental controls through your Internet Service Provider (ISP) to prevent access to inappropriate content
• ‘friend’ or ‘follow’ your child on social networking sites, so you can see how they are using them
• check they are old enough to join any websites or social networks with age restrictions
• advise your child not to post personal information or any images they wouldn’t want everyone to see
• check their social media accounts’ privacy settings. E.g. so their posts are only seen by friends and their location isn’t tracked
• avoid using webcams unless talking to close friends or family, and consider covering it when not in use
• monitor their usage and be watchful for any secretive behaviour 
• encourage your child to be open about what they do online and who they’re talking to
• insist you go with them if they wish to meet online friends
• ensure the games your child plays online are age appropriate
 
Thames Valley Police
 
You Might Also Read: 
 
Cyber Criminals Love The UK:
 
Cybercrime: Law Enforcement Must Get Serious:
 
« US Accuses Russia Of Interfering With Undersea Cables
China’s Electronic Surveillance Program Targets Muslims »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Sapphire

Sapphire

Sapphire deliver flexible and scalable cybersecurity solutions, helping organisations to detect, protect, respond and remediate against cyber threats.

Puppet

Puppet

Puppet is a leader in IT automation. Our software helps DevOps securely automate configuration and management of machines and the software running on them.

Avansic

Avansic

Avansic is a leading provider of e-discovery and digital forensics services to attorneys, litigation support teams, and business communities.

Securitybulls

Securitybulls

Securitybulls is an information security firm offering an encyclopedic penetration testing & IT security assessment service for your organization.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

C2A Security

C2A Security

C2A Security offers a comprehensive suite of cyber security solutions for the automotive industry, providing in-vehicle end-to-end protection.

Cyberstarts

Cyberstarts

Cyberstarts’ vision is to become the leading platform for amazing teams of entrepreneurs to solve the next big problems of the cybersecurity world.

WolfSSL

WolfSSL

wolfSSL is an embedded SSL/TLS library providing secure communication for IoT, smart grid, connected home, routers, applications, games, phones, and more.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

Dynamic Quest

Dynamic Quest

Dynamic Quest is a managed IT, cloud and security services companies, providing a comprehensive range of technology services including cybersecurity, backup and disaster recovery.

BreachQuest

BreachQuest

BreachQuest brings together cybersecurity experts with decades of experience identifying security flaws, penetrating networks, and responding to incidents.

Tozny

Tozny

Tozny offers products with security and privacy in mind that are built on the foundation of end-to-end encryption, and open-source verifiable software.

Netox

Netox

Netox is a comprehensive IT service provider that combines IT support services, IT solutions and specialist services; specializing in cybersecurity solutions.

NMi Group

NMi Group

NMi Group is a global pioneer in mission-critical Testing, Inspection, Certification, and Calibration (TICC) services.

Alcatel-Lucent Enterprise (ALE)

Alcatel-Lucent Enterprise (ALE)

We are Alcatel-Lucent Enterprise. Our mission is to make everything connect with digital age networking, communications and cloud solutions.

NetAlly

NetAlly

NetAlly network test solutions help engineers and technicians better deploy, manage, maintain, and secure today’s complex wired and wireless networks.