Cyber Security Part 3: Protecting Yourself

So far in this series we’ve covered important cyber terms and definitions along with common forms of attack. In the final part of our Cyber Security series, we’ll be sharing tips on how to protect yourself from a cyber attack. Some may seem obvious but it’s astounding that so many ignore the small things and open themselves up to attack. Let’s get to it!

Email links: 

Never click on links in an email. If you think the sender is legitimate (i.e. Google or Apple), go directly to their site and log on from there. If the email was valid, you should find whatever was being promoted on their site.

Text message links: 

Like email links, beware of text message links and do not click on any unknown links or answer any strange questions that request any personal information including your username or password.


Be sure to set secure passwords and DO NOT share them with anyone else. Make them difficult to guess by avoiding the use of personal information, common words and phrases. Instead, use upper and lowercase letters, numbers and special characters. Also, be sure to change your passwords regularly and implement a two-factor authentication so you are notified if someone is accessing your account from a new device.


Companies are not in the habit of sending attachments along with their emails, therefore, if you receive any attachments from a retailer, do not open it. When in doubt, call the company to verify whether or not they sent the email. Also, make sure the option to automatically download attachments is off.

Personal Information: 

Under no circumstance should you give out any personal information whether it be over the phone or via email unless you are 100% sure. Many people are hacked because they receive authenticity requests that appear to be from legitimate sources they have accounts with. They then provide their username and passwords giving the hackers access to their information. Instead, contact the company directly to verify the request.


Keep all anti-virus software, operating system, browser and any other important software up to date as they usually provide free patches and security updates.

Website URLs:

Pay close attention to the URLs you visit. Malicious users will often slightly change the spelling so it isn’t noticeable to users or use a different domain (i.e. .net instead of .com) to trick users.

Use these tips and begin protecting yourself today! If you’d like to further secure your system or see just how secure it is today, contact us. We can conduct friendly penetration system testing to locate any vulnerabilities and customize a cyber security plan just for you.

Watch our short video below for more information.