What makes me the Target?

Cyber criminals know that the more credit cards they steal, the more bank accounts they hack, or the more passwords they compromise; the more money they can make. They will literally attempt to hack anyone connected to the Internet, including you.


Cyber hackers will try to use different techniques such as social engineering and phishing in order to steal your sensitive data or your identity. Depending on the information they receive, they may:


  • Access your email.
  • Access your bank account.
  • Access your credit cards.
  • Create new identities.


They may also try to trick you into installing malicious software which will grant them full access to your computer and to your sensitive data. This malicious software may allow the creators to:


  • Encrypt your files and hold for ransom.
  • Log your keystrokes to discover your passwords to bank accounts and credit cards.
  • Send email containing malware to others, including your own contacts.
  • Use your computer as a bot to launch attacks on other computers and users.


Remember, you are not being singled out because you are special. Rather, these criminals are targeting everyone they can, which happens to include you. No matter where you are (work, home or traveling), cyber criminals are there to get you and You are the Target, so please Think Before you Click. You are the first line of defence against any cyber attackers!


Protect Yourself


By following some simple steps you can protect yourself:


  • Common sense is your best defence: if something seems odd, suspicious or too good to be true, it is most likely an attack.
  • Keep your operating system and software up-to-date on all computers and mobile devices.
  • Have a good password policy of creating strong, unique password for each of your accounts.
  • Encrypt and password-protect any sensitive data before you email it.
  • Never respond to a suspicious phishing email; if in doubt, report and delete.
  • Be mindful of what you post online.
  • Keep your mobile devices secure by enabling a PIN or passcode and only download apps from known sources such as Apple Store or Google Play Store.


What Should I Do?

If you are concerned you may have fallen victim to a cybercriminal, contact the IT Team.