British Police - Stay Safe From Cyber Crime This Christmas

10 Top Tips: Police advice on how stay on their guard and not fall victim to cyber-crime this Christmas. Cleveland’s Police and Crime Commissioner, Barry Coppinger, has urged the public to protect themselves by following a 10 step guide to cyber safety.

“Many people across Cleveland will be getting new computers, mobile phones, tablets or other devices this Christmas or buying them in the New Year, so now is a good time to check you are protected on all fronts. “Whether it is online bullying or Internet fraud, cyber-crime affects a wide range of victims.

“A priority of the Police and Crime Plan is working together to make Cleveland safer and tackling cyber-crime is an important part of that.”

A rapid increase in Internet crime has led to UK Cleveland Police setting up a dedicated cyber-crime unit to investigate all areas of offending, including fraud, trolling, harassment, indecent images and grooming.

Head of the Cyber-Crime unit, Inspector Steve Bell, joined the Commissioner in urging the public to help protect themselves.

“Cyber-Crime is like many other forms of crime, there are simple steps the public can take to protect themselves” said Inspector Bell. “Even if we uncover Internet crime it can be very difficult to prosecute as the criminals may be based in another country and outside our jurisdiction, so the best advice is to do what you can to avoid becoming a victim in the first place.”

For more extensive advice about safe business and personal use of the Internet visit www.getsafeonline.org/ or the force website.

10 Tips to stay safe from Cyber-Crime

1. Choose, use and protect your passwords carefully. Use a different one for every online account.

2. Protect mobile devices with a password.

3. Regularly update, and keep switched on, internet security software.

4. Don’t reveal anything confidential such as passwords or bank details on public Wi-Fi.

5. Avoid revealing personal or financial information in emails.

6. Be suspicious, fake emails and phone calls are a favorite way for fraudsters to find victims.

7. Don’t click links or open attachments in emails, posts, tweets of texts if the source isn’t known.

8. Never pay by direct bank transfer unless recipient is trustworthy.

9. Take your time and think twice.

10. Remember that if something seems too good to be true, it probably is.

Hartlepool Mail:          A Simple Way To Make Online Banking Safe. Really:

 

 

« Six Cyber Predictions For 2017
Medical Implants Can be Hacked »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Synology

Synology

Synology provides high-performance, reliable, and secure Network Attached Storage (NAS) products.

Spambrella

Spambrella

Spambrella provides email security with real-time threat protection. 100% SaaS (nothing to install)

Zerto

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments.

High Sec Labs (HSL)

High Sec Labs (HSL)

High Sec Labs develops high-quality, cyber-defense solutions in the field of network and peripheral isolation.

CyberSure

CyberSure

CyberSure is a programme of collaborations and exchanges between researchers aimed at developing a framework for creating and managing cyber insurance policy for cyber systems.

Threatspan

Threatspan

Threatspan is a cybersecurity firm helping shipping and maritime enterprises achieve and maintain nautical resilience in an age of increasing cyber threats.

Intuity

Intuity

The Intuity suite of services provides companies with a complete awareness of their security status and helps them in an efficient, efficient and sustainable improvement process.

Hallam-ICS

Hallam-ICS

Hallam-ICS designs MEP systems for facilities and plants, control and automation solutions, and ensures safety and regulatory compliance.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

Defendify

Defendify

We built Defendify to help small businesses navigate the cybersecurity landscape with cybersecurity that is dead simple, affordable, and works around the clock.

Silicon Cloud International

Silicon Cloud International

Silicon Cloud is a high performance and secure cloud computing platform for engineering and scientific applications.

Mjenzi Cloud

Mjenzi Cloud

Mjenzi Cloud is a provider of cloud IaaS solutions including managed backup services, affordable & secure cloud virtual compute/storage/compute services, bare-metal services and cloud security.

CyberRisk Alliance (CRA)

CyberRisk Alliance (CRA)

CyberRisk Alliance is a business intelligence company created to serve the rapidly evolving cybersecurity and information risk management marketplace.

Creative Network Innovations (CNI)

Creative Network Innovations (CNI)

Creative Network Innovations is a leader in providing advanced IT and cybersecurity solutions.

TENEX

TENEX

TENEX is a cybersecurity company leveraging advanced artificial intelligence and human expertise to transform enterprise security.

CyberSentriq

CyberSentriq

CyberSentriq provides an unmatched combination of proactive AI-driven email and web security, advanced data protection, and operational resilience.