Cybersecurity and You Booklet en
Cybersecurity and You Booklet en
Cybersecurity and You Booklet en
Contents
4 Cybersecurity
8
Personal cybersecurity
at a glance
10
Business cybersecurity
at a glance
18 Notes
1. Have computer security programs 2. Be smart about where and how you 3. G
et to know standard Internet 4. Ignore unsolicited emails asking you
running and regularly updated to connect to the Internet for banking safety features. to open an attachment or click on a
look for the latest threats. or other communications involving Install anti-virus software to protect link if you’re not sure who truly sent
Install anti-virus software to protect sensitive personal information. against malware (malicious software) it and why.
against malware (malicious software) Public Wi-Fi networks and computers at that can steal information such as Cybercriminals are good at creating fake
that can steal information such as places such as libraries or hotel business account numbers and passwords, and emails that look legitimate, but can install
account numbers and passwords, and centers can be risky if they don’t have use a firewall to prevent unauthorized malware. Your best bet is to either ignore
use a firewall to prevent unauthorized up-to-date security software. access to your computer. unsolicited requests to open attachments
access to your computer. or files or to independently verify that the
supposed source actually sent the email to
you by making contact using a published
email address or telephone number.
5. B
e suspicious if someone contacts 6. Use the most secure process you can
you unexpectedly online and asks when logging into financial accounts.
for your personal information. Create “strong” passwords that are hard
A safe strategy is to ignore unsolicited to guess, change them regularly, and try
requests for information, no matter how not to use the same passwords or PINs
legitimate they appear, especially if they (personal identification numbers) for
ask for information such as a Social several accounts.
Security number, bank account numbers
and passwords.
7. B
e discreet when using social 8. Be careful when using
networking sites. smartphones and tablets.
Criminals comb those sites looking Don’t leave your mobile device unattended
for information such as someone’s and use a device password or other method
place of birth, mother’s maiden name to control access if it’s stolen or lost.
or a pet’s name, in case those details
can help them guess or reset passwords
for online accounts.
Protect your computer. Install software from the computer. To learn about additional name, and other information that can help
that protects against malware, or malicious safety steps, review your web browser’s them figure out passwords—or how to reset
software, which can access a computer user instructions. them. Don’t share your ‘page’ or access
system without your consent to steal to your information with anyone you don’t
passwords or account numbers. Also, use Be suspicious of unsolicited e-mails know and trust. Cyber criminals may pretend
a firewall to prevent unauthorized access to asking you to click on a link, download an to be your ‘friend’ to convince you to send
your PC. While protection options vary, make attachment, or provide account information. money or divulge personal information.
sure the settings allow for automatic updates. It’s easy for cyber criminals to copy the
logo of a reputable company or organization Take precautions with your tablet or
Use the strongest method available into a phishing email. When responding smartphone. Consider opting for automatic
to log into financial accounts. Use the to a simple request, you may be installing updates for your device’s operating system
strongest authentication offered, especially malware. Your safest strategy is to ignore and “apps” (applications) when they become
for high-risk transactions. Use passwords that unsolicited requests, no matter how available to help reduce your vulnerability to
are difficult to guess and keep them secret. legitimate or enticing they appear software problems. Never leave your mobile
Create “strong” user IDs and passwords for device unattended and use a password or
your computers, mobile devices, and online Be careful where and how you connect other security feature to restrict access in
accounts by using combinations of upper- to the Internet. Only access the Internet case your device is lost or stolen. Make
and lower-case letters, numbers, and symbols for banking or for other activities that involve sure you enable the “time-out” or “autolock”
that are hard to guess and then change them personal information using your own laptop feature that secures your mobile device when
regularly. Although using the same password or mobile device through a known, trusted, it is left unused for a certain period of time.
or PIN for several accounts can be tempting, and secure connection. A public computer, Research any app before downloading it.
doing so means a criminal who obtains one such as at a hotel business center or public
password or PIN can log in to other accounts. library, and free Wi-Fi networks are not
necessarily secure. It can be relatively easy
Understand Internet safety features. for cyber criminals to intercept the Internet
You can have greater confidence that a traffic in these locations.
website is authentic and that it encrypts
(scrambles) your information during Be careful when using social
transmission if the web address starts networking sites. Cyber criminals use
with “https://.” Also, ensure that you are social networking sites to gather details
logged out of financial accounts when you about individuals, such as their place or date
complete your transactions or walk away of birth, a pet’s name, their mother’s maiden
Protect computers and networks. Install Require strong authentication. Ensure Control access to data and computers Teach employees the basics. Establish
security and antivirus software that protects that employees and other users connecting and create user accounts for each security practices and policies for employees,
against malware, or malicious software, to your network use strong user IDs and employee. Take measures to limit access such as appropriate Internet usage guidelines,
which can access a computer system passwords for computers, mobile devices, or use of business computers to authorized and set expectations and consequences
without the owner’s consent for a variety and online accounts by using combinations individuals. Lock up laptops when not in for policy violations. Establish a top-down
of uses, including theft of information. of upper- and lower-case letters, numbers, use as they can be easily stolen or lost. corporate culture that stresses the importance
Also, use a firewall to prevent unauthorized and symbols that are hard to guess and Require each employee to have a separate of strong cybersecurity, especially when it
access. Protection options vary, so find changed regularly. Consider implementing user account and prohibit employees from comes to handling and protecting customer
one that is right for the size and complexity multi-factor authentication that requires sharing accounts. Only give employees information and other vital data. Ensure that
of your business. Update the software, as additional information beyond a password to access to the specific data systems they all employees know how to identify and report
appropriate, to keep it current. For example, gain access. Check with vendors that handle need to do their jobs, and don’t let them potential security incidents. Train employees
set antivirus software to run a scan after sensitive data to see if they offer multi- install software without permission. Also, to be careful where and how they connect
each update. If you use a wireless factor authentication to access systems make sure that only employees who need to the Internet. Employees and third parties
(Wi-Fi) network, make sure it is secure or accounts. administrative privileges, such as IT staff should only connect to your network using
and encrypted. Protect access to the and key personnel, have them and regularly a trusted and secure connection. Public
router by using strong passwords. review their ongoing need for access. computers, such as at an Internet café, hotel
business center or public library, may not
be secure. Also, your employees shouldn’t
connect to your business’s network if they
are unsure about the wireless connection
they are using, as is the case with many free
Wi-Fi networks at public “hotspots.” It can be
relatively easy for cyber criminals to intercept
the Internet traffic in these locations.
CH-8070 Zurich
credit-suisse.com
Copyright © 2017 Credit Suisse Group AG and/or its affiliated companies. All rights reserved.