This article is published on page 27 CYBERSECURITY AWARENESS of Pelepas Insight_August 2018 issue (

PTP has conducted a valuable awareness event in this month. To keep the momentum of what you have learnt we have compiled a list of things you should be thinking about whenever you’re using the Internet. You have probably heard many or all of these tips before, but repetition does not spoil the prayer. If you take security seriously, you are already using tools such as updated anti-virus or built-in firewall of your operating system to protect your computer from malware, ransomware, and other advanced threats. We believe you are smart and are aware that there’s no substitute for educating yourself and your co-workers. Share this list below with other users

  1. Don’t ever say “It won’t happen to me.” because you are always an attractive target to hackers.
  2. Practice good password management. Use a strong mix of characters such as P+PP@$$, and don’t use the same password for multiple sites. Don’t share your password with others, don’t write it down somewhere that is easily noticeable, and definitely don’t write it on a post-it note attached to your monitor.
  3. Never leave your devices such as mobile, tablet, or laptop unattended. If you need to leave your devices for any length of time, no matter how short, lock your screen with password so no one can use it while you’re not around. If you are keeping highly sensitive information on a flash drive or external hard drive, make sure to lock it up physically as well.
  4. Always beware when clicking on any attachments or links in your email. If it’s suspicious or unexpected for any reason at all, don’t click on any link or attachment. Be careful when you type the URL because unscrupulous people will often take advantage of spelling mistakes to redirect you to a harmful domain.
  5. Sensitive browsing, such as online banking or online shopping, should only be performed on a device that belongs to you, on a home or office networks that you trust. Your data could be copied or stolen if you use a friend’s phone, a public computer, or a cafe’s free Wi-Fi.
  6. Always back up your data regularly, and your anti-virus software must always be up to date.
  7. Be cautious of what you plug in to your computer. Any type of malicious software such as malware or ransomware can be spread through infected flash drives, or external hard drives, and even smartphones.
  8. Watch what you’re sharing on social media networks such as Facebook or Instagram. Criminals will try to befriend you in order to easily gain access to a shocking amount of your information like which school you’re from, where you are working, when you’re on vacation and so on.
  9. When offline, be conscientious of social engineering, where someone endeavours to gain information from you through manipulation. If someone unknown calls or emails you asking for sensitive information such as bank account number, you should always say no. You can call the company directly to verify credentials before giving out any information.
  10. Be sure to monitor your bank accounts, email accounts, social media accounts for any suspicious activity. If you see something unfamiliar, it could be a sign that your accounts have been compromised.


Special thanks to my son who edited this.

About chanmingman

Since March 2011 Microsoft Live Spaces migrated to Wordpress ( till now, I have is over 1 million viewers. This blog is about more than 50% telling you how to resolve error messages, especial for Microsoft products. The blog also has a lot of guidance teaching you how to get stated certain Microsoft technologies. The blog also uses as a help to keep my memory. The blog is never meant to give people consulting services or silver bullet solutions. It is a contribution to the community. Thanks for your support over the years. Ming Man is Microsoft MVP since year 2006. He is a software development manager for a multinational company. With 25 years of experience in the IT field, he has developed system using Clipper, COBOL, VB5, VB6, VB.NET, Java and C #. He has been using Visual Studio (.NET) since the Beta back in year 2000. He and the team have developed many projects using .NET platform such as SCM, and HR based applications. He is familiar with the N-Tier design of business application and is also an expert with database experience in MS SQL, Oracle and AS 400.
This entry was posted in .Net, Community, Computers and Internet, Operating System and tagged . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.