Skip to main content

Malicious software or malware is most commonly ingested onto Personal Electronic Devices or home computers when users respond to Spam or Phishing e-mails. Malware can also be introduced when:

  • users action an SMS request from someone they don’t recognise,
  • they download an App for a free gift,
  • they respond to a ‘Friend of a Friend’ on Social Media, or
  • they visit websites they do not recognise.




Guidance on how to keep safe in the cyber environment or exercise ‘good cyber hygiene’ are repeated below:

Cyber checklist

  • ALWAYS install updates, Anti-Virus and update your devices.
  • Think before Posting / Tweeting / Sharing information online.
  • Use public WiFi with caution and use a Virtual Private Network if possible.
  • Create strong passwords or passphrases and always log out of websites.
  • Secure online profiles, security settings and enable Two-factor Authentication.

Top Tips

  • Use encrypted messaging; WhatsApp instead of SMS.
  • Use Voice Over Data instead of Voice Over Network.
  • Turn off Geo-locating software.
  • Use Wi-Fi connectivity instead of Mobile Phone Networks.
  • Always use the manufacturer’s recommended security settings.

Or put another way

  • Employ physical security. Having physical access to a device makes it easier for an attacker to extract or corrupt information.
  • Encrypt your files. If you are storing sensitive personal or financial information on your device, encrypt the files.
  • Disable remote connectivity. Some mobile devices are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers.
  • Use good passwords. Choose devices that allow you to protect your information with passwords. Do not choose options that allow your computer to remember your passwords.
  • Be cautious of public Wi-Fi networks. Before you connect to any public wireless hotspot – like on an airplane or in an airport, hotel, train/bus station or café: Be sure to confirm the name of the network and exact login procedures, do not conduct sensitive activities, only use sites that begin with https:// when online shopping or banking.
  • Keep software up to date. If the vendor releases updates for the software operating your device, install them as soon as possible.


Exercise good cyber hygiene and make safe judgments in the cyber environment.

POC: G2 Branch.