1. Set a secure password
Do not use a single password on all sites. Do not use passwords based on words from the dictionary, such as "kitty123". Set up a longer password, which consists of seemingly random characters, which for you will make more sense. You should change them sometime.
For how to set a secure password on the Internet, read here.
2. Have limited trust in free offers
Just like in life - on the Internet you rarely get something for free. If someone offers you something like that, think about the motives and if you do not put yourself in danger. Do not reply to emails with suspicious offers, do not click on links in messages from unknown sources.
3. Regularly check your computer
Having antivirus software should be obvious to you, without two sentences. But what you should still remember,
This is a weekly full scan of your computer. Many programs allow you to set up an automatic scan from time to time, which you do not need to keep in mind on a regular basis.
4. Take care of your privacy
Limit your profile to social networking. By adding private content, set visibility only for friends.
Do not accept people you do not recognize. Do not make public data that will allow you to identify your address, possessions, family relationships. Such knowledge can be exploited by perpetrators.
5. Check the authenticity of your sites
Remember that every page that needs a login should start
in the address bar of the browser from https, not http. It is also important to check the site's authenticity, which is available in browsers.
6. Pay special attention to the banks
No bank in Poland sends email to customers requesting login
and account password. It also does not send direct messages to the login page. Maile of similar content deserves only to be treated with the Delete button.
7. Carefully read the regulations
Before registering on any web site, read carefully the rules. Enough people give you money to cheat on the net.
Do not enlarge this team.
8. Be aware of the consumer
You can return the goods to the seller within 10 days
without giving a reason. Watch out! Unpacked music and programs are not refundable!
9. Do not be intimidated
Downloading movies and music is illegal? This is bullshit - do not be intimidated. You have the right to download all published works under your own authorized use. But beware! You do not have the right to continue downloading downloaded songs on the Internet or download and use paid versions of your computer programs.
10. Always be reasonable
Remember! The most important program to protect your computer online is common sense! Be alert, the enemy is not sleeping!
Check on the website of your bank what security is used on the website.
Always follow the security rules out there. In case of any irregularities immediately contact us
with an employee of the Bank.
A computer or mobile phone connected to the Internet must have an antivirus program installed and must be up-to-date.
Activation of relevant modules is also required
in a security package such as an antivirus monitor, a mail scanner, or a firewall. A common mistake is to disable these modules to reduce system load.
Make Internet payments only using "certain computers."
Do not make payments online from computers in public places such as internet cafes or universities.
Contact your internet service provider to make sure they use secure distribution channels.
Pay close attention to the quality and security of your Internet service provider. If you have any doubts in this regard you always have the right to ask the provider about the quality of the security offered by him.
Install only legitimate software on your computer.
Programs of unknown origin, including downloaded
Peer-to-Peer (P2P) programs may be prepared by hackers and contain viruses or other malicious software.
It is recommended that you periodically scan your computer,
in particular before entering the bank's website and executing any transaction.
Most anti-virus programs with antivirus monitor enabled have detection (detection)
same as antivirus scanner and no need to scan your computer. However, some programs that detect anti-virus monitor are lower than the scanner, but this is a security vulnerability.
Update your operating system and applications such as web browsers.
Hackers are constantly looking for vulnerabilities in the software that They are then used for cybercrime. Operators and applications publish patches that address vulnerability
Their products for attacks carried out through found gaps.
Do not open messages and attachments of unknown origin.
Often, such attachments contain viruses or other software that allows you to spy on your activities.
Avoid encouraging sites to see very attractive content or attractive deals.
Particularly dangerous websites may contain pornographic content. Also, seemingly innocent pages containing "freeware" programs can also be very dangerous, as hackers often recompile them by adding malicious code
Remember, no bank will ever send you queries about your passwords or other sensitive data or requests for updates.
Banks never provide inbound links to transactional websites. Letters, emails or phone calls on such matters should be treated as an attempt to delude sensitive information. Do not respond to them by submitting your confidential data. Immediately contact your bank
and report the event.
When logged into the transaction system
Do not go away from your computer and log out when you are done close and close the browser.
IDS
This Intrusion Detection System is designed to identify dangerous activities in the network. Looks for any unauthorized or suspicious network activity that could pose a threat to the system.
Detects unsuccessful attempts to attack or prepare for full intrusion, such as port scanning or network mapping by searching for critical servers, services, and applications. The task of IDS probes is to collect information, and the task of the management system is to process the collected information and to extract the signals from the attack.
Anti-Spam Programs
This is a kind of software that blocks unwanted correspondence sent electronically. Programs filter messages and use so-called blacklists of addresses and domains used by spammers. Most of these types of software have the ability to set up their own rules, which we can modify and define, for example, key words in advertising materials, thus blocking our mailbox with messages containing those words in the shipping title. However, these programs are not error-free and sometimes they can block the correspondence that should be delivered
Anti-virus programs
This is a computer software that has the task of detecting, securing, combating, removing
and to repair damage caused by computer viruses. If the application runs with malicious software then the program will execute the appropriate action that will exclude the virus and allow access to the program running. An important function of each antivirus is to regularly update the definition of viruses included in the program.
FireWall
A firewall is a way to protect your computers, networks, and servers from intruders. A firewall can be either computer hardware with special software or software that blocks access to our resources to unauthorized persons or programs. Only a few years ago, firewall software was available and was dedicated to important servers or large networks. However, with the rapid growth of technology, the firewall becomes the indispensable software of any home computer connected to a LAN or Internet. A firewall on such a home computer checks all incoming and outgoing network traffic, restricts and forbids access on both sides to unknown programs or users.
Make transactions with known and verified online stores. For smaller sites, check their credibility, for example, by calling the service and verifying their offer, terms of transaction, and complaints. Make sure you are not on a website pretending to be your bank / store (like the name and appearance of the site used by dishonest imitators in order to mislead and steal money). Read the terms and conditions of the online store, especially with regard to transaction security. Before making a transaction, make sure that the transmission is in secure connection using SSL / TLS.
Protect your card number and other sensitive transaction codes such as PIN, CVV2 or CVC2 - the last three digits of the number on the signature bar on the back of the card.
Criminals can take possession of them by recording a card image, for example, using a cell phone with a camera, video camera, or otherwise.
Do not save the PIN code on the card or store it with the card.
In such circumstances, not only do you act contrary to the law, but also in the event of theft of your wallet or purse and use your payment card, the bank will be relieved of the obligation to cover the resulting damage.
Never provide card information on pages that are not secure.
For example, sites with pornographic content or websites of unknown companies offering branded goods at sensational prices. Before entering the card number on the form on the page, make sure that the data sent from the form is adequately protected (ie - to simplify - whether the address of the form starts with https and whether the site has the appropriate certificates) - this information is given by the browser, usually in the status bar at the bottom of the window). .
Never respond to e-mails from which you need to provide information about your card - report this situation to your bank.
Also, do not respond to e-mails that invite you to visit the website to verify the data, including the cards. This kind of fraud is called "phishing".
Please keep your eyes on the card number.
Do not share your card number with anyone who is calling us, even if the caller is reporting that there are computer problems and asking for verification information. It is not customary for businesses to call by calling their card number. If we are initiating a call, also do not make a phone number card available when we are not sure that the caller deserves credit.
Phishing
It's tricky to get sensitive personal information like passwords or credit card details by pretending to be a trusted person whose information you need urgently. This is a kind of attack based on social engineering. Today cybercriminals use phishing techniques for profit. The most popular are banks or online auctions. Phisher usually sends spam to a large number of potential victims by directing them to a Web site that pretends to be a real online bank, and in fact captures the information that the attackers put in there. The most common way is information about the alleged deactivation of the account and the need to reactivate, including any confidential information. Another common way is also to imitate the website of the Internet bank, the user enters all the necessary information to properly log in, but does not take place, and the data entered by the user is obtained by the phisher.
Contact your internet provider to make sure they are using it
on the secure distribution channels of this service.
Check the security of your bank
on the web site. Always log on every time you log in
to the security rules published there.
The bank sends you questions about your passwords or other sensitive data in which case you should update them.
It does not matter to open the message and their attachments from unfamiliar sources.
In case of doubt about the transaction I contact the contact center of my bank