0% found this document useful (0 votes)
27 views

Pocket Guide To A Cyber Secure Home

The document discusses common cyber threats to devices and accounts in the home, including routers, Wi-Fi networks, TVs, games consoles, computers, smartphones, tablets, smart toys, smart security devices, smart home devices, and online accounts. It provides tips to secure these areas from cyber criminals, such as changing default passwords, enabling automatic updates, using antivirus software, and securely configuring devices and networks.

Uploaded by

anne zinsou
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views

Pocket Guide To A Cyber Secure Home

The document discusses common cyber threats to devices and accounts in the home, including routers, Wi-Fi networks, TVs, games consoles, computers, smartphones, tablets, smart toys, smart security devices, smart home devices, and online accounts. It provides tips to secure these areas from cyber criminals, such as changing default passwords, enabling automatic updates, using antivirus software, and securely configuring devices and networks.

Uploaded by

anne zinsou
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

common Cyber criminals will

look for weak points in


Router –
Your gateway
Wi-fi
Don’t make your Wi-Fi network on
TVs and Games Consoles
Most TVs and games consoles
Computers & laptops
These devices hold and process a

cyber
your broadband router easy for can connect to the Internet, which lot of your personal data.
your HOME to get their to the Internet cyber criminals to access. makes them vulnerable to cyber It is important to properly protect
hands on finances or Your broadband router is the All the data that transmits wirelessly security breaches if they’re not them from unauthorised use and

threats
gateway to the Internet and your around your home needs to be securely set up and kept up to from viruses (also called malware).
sensitive data that first line of defence from cyber protected. Learn how to secure it date by enabling automatic Learn the basics of securing your
they can use for criminals being able to access your
home network or other devices.
correctly and change the default
password.
software updates. devices and be sure to install
anti-virus software.
their own gain. Learn how to use its security
features such as turning
This diagram highlights key on a built in firewall and changing
weaknesses in the home that the default login password.
you should be aware of.
See Tips: 2 3 4 5 See Tips: 3 5 See Tips: 8 10 11 See Tips: 1 4 5 6 7

smart phones & tablets


SOCIAL ENGINEERING Mobile devices carry as much data
Attackers attempt to trick you into as a PC or laptop. Because they
doing 'the wrong thing', such as are portable, they can be easily
clicking a bad link that will lost or stolen. Learn how to secure
download malware or direct you them correctly.
to a malicious website.
See Tips: 1 5 6 8 9 10
malware
Malicious software or file that can
infect a device and be a security
risk to the user.

ransomware We have included practical tips


Locks the user out of their files (found overleaf) that you can
or their device, then demands an refer to, to help you secure
anonymous online payment to these weaknesses and further
restore access. guidance can be found on our
'Secure Your Home Information
spyware Hub' on our website.
Unwanted software that
infiltrates your device, stealing www.nicybersecuritycentre.gov.uk/
your Internet usage data and home-security
sensitive information.

Malicious Websites & Apps


Websites or Apps that contain HOME OFFICE Smart toys Smart SECURITY devices Smart devices ONLINE ACCOUNTS &
malware or malicious content that
compromise your data and device.
When working from home it’s 'Smart’ or ‘connected’ toys are Internet-connected security devices Smart home devices such as smart CLOUD SERVICES
important to keep your devices interactive and can be used by such as CCTV cameras, baby speakers and appliances (some-
monitors, locks and doorbells are Services you use online like
secure against cyber criminals and children from as young as three. times called Internet of Things or
UNSECUREd Wi-FI unauthorised access by family and They can be connected via open to the same risks as other IOT) contain miniature computers
shopping, social media, email,
Hackers can steal unencrypted media streaming, and cloud
friends. Portable devices can be lost Bluetooth or a Wi-Fi connection. smart home devices, except cyber that connect to your home network.
data from users' devices services (e.g. photo/file backup
or stolen more easily, which means As with any smart devices, you criminals can access live footage
accessing the Internet through sites) can be targets for cyber
the data on them could be at risk. should check that the Internet and possibly control your door Cyber criminals can use these
unsecured public Wi-Fi. criminals, due to the personal data
Make sure you know how to report connection it links to is securely set locks. Learn how to set up smart devices to spy on you or to commit
security devices properly to protect and financial information stored on
DEVICE THEFT any problems to your IT department. up, and that any apps it links to on other crimes.
your home. them. Strong passwords and
Criminals steal your device, your phone or tablet are securely
enabling 2 Factor Authentication
then use it to commit criminal configured. Ensure security is part of your
can help protect your data.
acts online. buying criteria when purchasing
'smart devices' and learn how to
keep them updated and secure.

See Tips: 4 8 9 12 See Tips: 5 6 8 10 See Tips: 3 5 8 10 See Tips: 3 5 8 10 See Tips: 5 6 7 10
a CYBER 1.Physical Security
• Store devices out of sight in safe
places when not in use e.g. car or
4. use Anti-Virus and
Firewalls
8. sECURE your software
• Enable automatic updates for
operating systems (e.g. Windows),
11. TURN ON PARENTAL
CONTROLS
Pocket Guide to

a cyber
secure home • Firewalls help stop unwanted apps, and anti-virus software - this • Make sure there is a password or
Internet traffic and malicious apps PIN for you to verify payments your

secure
will allow the latest versions to
• Turn on a ‘Find My Device’ service using your network. always be in place, minimising the children want to make, for example,

home so that lost or stolen devices can


be located, and data can be wiped
remotely if necessary.
• Turn on the firewall included on
your Internet Service Provider’s
router.
risk of cyber attacks due to using
out of date software.

• Only purchase and download


in-game, or app purchases,
otherwise they might purchase
things above their age group.
HOME
HAVE CONFIDENCE IN • Regularly make a secure backup
• Install an anti-virus package with
software from reputable and trusted • Set up content filters on devices
that will block inappropriate
Practical steps to help
secure your connected
YOUR HOME SECURITY of your data separate from your
computer, offline, and stored in a built in firewall to secure each
sources.
websites. home.
safe place. device against malware. • Only buy devices from reputable
A connected home is set up • Talk to children about Internet
so that Internet-enabled retailers to ensure they adhere to
safety. Useful resources on this can
appliances and devices like 2. KNOW YOUR Network 5. Use strong Passwords safety and security guidelines
be found on our website information
central heating, lighting, security • Change the default username • Set strong passwords using three
• If a device is no longer supported hub.
cameras, baby monitors, TV's and password on your Internet random words - longer is stonger.
and kitchen appliances can be by the manufacturer, replace it with
Service Provider’s router and any
controlled remotely using other network devices you may • Ensure you have a strong one that is. 12. WORK FROM HOME
a networked device such as a password for your primary email
smart phone.
have. Your provider should give you
because criminals could use this
SECURELY
instructions on how to do this. • Be aware of your organisation’s
While a connected home is
email account to get access to your
other accounts using the ‘Forgot
9. BEWARE OF FAKE EMAILS policies and procedures. ALWAYS REPORT
• Be aware of what is connected
efficient and makes life a lot easier, to your wired network and Wi-Fi Password’ feature. AND TEXTS • Know how to report cyber CYBERCRIME,
there are security risks. If these • Scam emails (phishing) and text
using tools like the ‘Fing’ app. Some incidents.
'smart' appliances and devices
are not correctly set up and
routers also have this feature built
in. This will help identify any devices
• Don't reuse passwords on multiple
accounts.
messages (smishing) that appear
to be from reputable sources are ESPECIALLY IF YOU
• Don’t let family members use your
secured, cyber criminals could
gain acess to them and potentially
that should not be using your
network. • Use a password manager or your
known as social engineering. These
are sent by cyber criminals trying to work device. HAVE BECOME
steal personal & private data and
financial information that you
browser to store your passwords. encourage the recipient to click on
a dangerous website link, download • Accept software updates as soon A VICTIM
store or access through your 3. sECURE YOUR Wi-Fi malicious software or give out as they appear on your device.
smart devices. • Never set your Wi-Fi network 6. enable 2 factor confidential data. PSNI
to ‘Open’. Your Internet Service
Provider should give you authentication • Don’t click on links, download W:
T:101 (Non Emergency)
www.psni.police.uk
instructions on how to secure • Use Two Factor Authentication attachments or take any other
(2FA) - this is essential and a way
your Wi-Fi with 'WPA2' or 'WPA3'
encryption standard. of ‘doubling up’ on security by
action if you’re unsure about the
sender of the email or text.
Action fraud
T: 0300 123 2040
verifying your identity using a code
W: www.actionfraud.police.uk
• Change the default name of your sent to your mobile phone, email • Send suspicious texts to 7726
Wi-Fi network (called the SSID) to address, or from an authenticator and phishing emails to
something that won’t disclose your app. report@phishing.gov.uk If you are in immediate danger
Internet Service Provider’s name and need assistance dial 999
(which can reveal the hardware you 7. SURF THE Internet
are using to cyber criminals).
SECURELY 10. SET UP PRIVACY
• Change the default Wi-Fi • Use an up to date web browser CONTROLS
password to something strong and such as Microsoft Edge, or Google • Only allow necessary cookies for
hard to guess, and only share it with Chrome. websites when you visit.
We work to make Northern Ireland people you trust.
cyber safe, secure and resilient for • Check the address bar to make • Review privacy settings for apps
its citizens and businesses. • Set up smart devices (e.g. your sure you are on the proper website on your devices and for services
Contact us
info@nicybersecuritycentre.gov.uk
smart speaker) on a ‘Guest’
Wi-Fi network so that they are kept
you intended to visit. that you use online.
visit our HOME SECURITY
Visit our website
separate from devices that store • Only use reputable websites for
shopping.
• Don’t give more information
than what is required to create an
hub for guidance
private data, such as your PC or
www.nicybersecuritycentre.gov.uk
laptop. This reduces the risk of account or use a service. and TUTORIALS
Follow us on Twitter a hacker getting access to your • Don’t give more information that is
@NICyberSC main network through one of these needed to carry out a transaction. • Make sure your social media
devices. More information on how to accounts are set to private so
do this can be found on our website • Consider more secure payment that your information is not widely
information hub. options – e.g. payment services shared.
Version 1 - October 2021

In association with :-
like PayPal, or a credit card that
provides additional buyer protection.

nicybersecuritycentre.gov.uk/home-security

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy