Module 3, Unit 3
In Progress

Unit 2: Self-directed learning – Threats in the cyber world

Module Progress
0% Complete

Tips for personal security

Tips for personal security section aims to raise awareness on general security issues to reduce the levels of attacks and also to reduce vulnerability by taking some personal security precautions. Therefore, it provides guidelines and practical advice on safety, security, and protection to individuals and organisations.

Have a look at the following video, in which Dr. Romeo Farinacci discusses why Cybersecurity is Important. TEDx Grand Canyon University

- Awareness andpersonal digital hygiene

Since people’s interaction with the digital world has increased, and cyber risks and threats are omnipresent, improved cybersecurity has become a necessity for all individuals and organisations upon the digital networks. These bring the awareness and personal digital hygiene tips -which are based on Bamrungchok’s (n.d.) digital hygiene guide- and encourage all actors to perform routine-based digital practices to minimise their encounter with cyber risks.

These digital hygiene tips include:

- The use of Two-Factor Authentication (TFA), Multi-Factor Authentication (MFA) and Third-Party Authenticator (TPA) Practices

TestMatick (2018) & Cipher (n.d.) supported that such authenticator services add additional layers of security and protection to the standard password method of online identification. Through the utilisation of a Two-Factor Authentication, an internet user gains an additional method of authentication such as a Personal Identification Code, another password, or even fingerprint. With Multi-Factor Authentication (MFA), internet users enter more than two additional authentication methods after entering their username and password. A Third-Party Authenticator application enables two-factor authentication, usually by generating a random code on a different device and/or service (e.g., on smartphone or email account), which users are prompted to subsequently add on the website they attempt to gain access to. All these platforms provide authentication and identification to users, by using their media accounts.

- Password policies

Password policies set and design rules to enhance security awareness, computer security, as well as encourage users to employ strong passwords and use them properly. Jithukrishnan (2022) presents some key points of those rules:

- Remote workforce/ Learn how to gain personal security at home/ Stay safe while working from home

VMware (n.d.) argued that the Coronavirus Outbreak in 2020 has disrupted labour markets globally and changed the way many employees and organisations work. Since then, the transition to telework/remote working has been adopted intensively. However, working from home (WFH) presupposes some personal security at home. Some useful tips and methods for improving individuals’ who WFH security are:
Have a look at the following video, in which Jaya Balloo, a chief information security officer, introduces simple cybersecurity measures that internet users can use to safeguard their data.  TEDx Rotterdam

- E-mail protection (what to look for, what to avoid)

E-mail protection refers to the designed technology of preventing, detecting, and responding to cyber-attacks delivered via email. The term covers everything from gateways, email systems and user behaviour, to related support services and security tools. It allows securing and controlling the inbound and outbound email, by identifying and blocking phishing and impostor threats. (Imperva, n.d.)

- Security solutions and services/ Web protection

Regarding cyber security solutions and services, Imperva. (n.d.) provides some helpful tools for individuals and organisations to ensure web protection.

General prevention tips: