Police Advice On Cybercrime & Online Safety

Cybercrime covers all crimes that take place online, are committed using computers or are assisted by online technology. Anyone can become a victim of cybercrime. It’s estimated that nearly six million fraud and cyber-crimes are committed each year, with as many as one in 10 people falling victim.
 
To reduce your chances of becoming a victim:
• use a strong password or passphrase which is at least 12 characters long and contains a mixture of letters, numbers and symbols
• never give personal or sensitive details out online or over email
• make sure all devices have up-to-date anti-virus software and a firewall installed
• keep software and apps regularly updated
• only download from legal, trusted websites
• only open emails and attachments from known and trusted sources
• look for the padlock icon in the address bar when paying for goods or services online, this means the website is trusted and secure
• check the address starts with ‘https://’ whenever you’re asked to enter sensitive information online
• avoid using public Wi-Fi hotspots that are not secure or require personal information to be given
• regularly backup your data
• control your social media accounts – regularly check your privacy settings and how your data is being used and shared
• be cautious of Internet chats and online dating, there’s no guarantee you’re speaking to who you think. Be extremely cautious if you’re asked for money
 
Visit Cyber Aware for step-by-step instructions on keeping your devices up-to-date with the latest security updates.
 
Scams
Be careful when opening emails and texts, especially if they’re from an unknown sender. If an email or text is unexpected or seems unusual, even if it’s from someone you know, ignore it and contact the sender directly to check if they sent it.
Your bank, the police and other reputable companies will never contact you via email, the phone or by text message and ask for sensitive or financial details.
 
To protect yourself from scams:
• don’t open attachments or click on links in emails or texts from senders you don’t know
• never give out personal information, financial details or passwords in response to an email, when you receive an unexpected phone call or in response to a text message
• set up spam filters on all of your accounts
• don’t respond to emails or texts from unknown sources
• always go to a website directly, by typing out the address yourself, when logging into an account
 
Social Networking
Social networks are a great way of keeping in touch with friends and family, but be careful about how much personal information you choose to share. Once you post or share something on any social media platform it’s out of your control and could be shared and used by others, even if you delete it.
 
Make sure you:
• set your privacy settings to the highest level and check them regularly as updates can affect settings
• don’t add or accept ‘friend’ requests from people you don’t know
• where possible, block apps and social media sites from tracking and showing your location, and habits stop people you don’t know from following you
• think carefully about the images, videos and content that you share
• remember that if you wouldn’t do or say it in the real world, don’t do it online
 
How to Spot a Fake Website
If an online offer looks too good to be true, it probably is. There are a number of simple tips to help spot a fake site:
• Sense check the domain name
• Are the prices too good to be true?
• Never pay by bank transfer – legitimate sites will accept payment via usual methods, such as bank card and PayPal
• Check the Terms and Conditions, and policies are clear and fair
• Read online reviews of the company and its products to check for customer satisfaction ratings (Trustpilot, Feefo)
Backup your Data
Ransomware is a type of malicious software that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
Ensure you save all your documents and photos in at least one other location to minimise the risk of losing everything if you receive a Ransomware virus. You can backup data on to a USB stick, an external hard drive or to a cloud server. Remember to regularly backup your data.
Tips for Parents and Guardians
The internet can be a valuable resource for children, allowing them to connect with friends and learn new things. But there are also dangers to going online, and children can be particularly vulnerable.
Talking to your child is one of the best ways to keep them safe online. By understanding the risks and keeping yourself up-to-date, on the latest technology, websites and social networks, you can help your child enjoy the internet safely and securely.
 
To help protect your children online:
• keep computers and games consoles in family rooms where you can monitor activity
• install parental control software or activate parental controls through your Internet Service Provider (ISP) to prevent access to inappropriate content
• ‘friend’ or ‘follow’ your child on social networking sites, so you can see how they are using them
• check they are old enough to join any websites or social networks with age restrictions
• advise your child not to post personal information or any images they wouldn’t want everyone to see
• check their social media accounts’ privacy settings. E.g. so their posts are only seen by friends and their location isn’t tracked
• avoid using webcams unless talking to close friends or family, and consider covering it when not in use
• monitor their usage and be watchful for any secretive behaviour 
• encourage your child to be open about what they do online and who they’re talking to
• insist you go with them if they wish to meet online friends
• ensure the games your child plays online are age appropriate
 
Thames Valley Police
 
You Might Also Read: 
 
Cyber Criminals Love The UK:
 
Cybercrime: Law Enforcement Must Get Serious:
 
« US Accuses Russia Of Interfering With Undersea Cables
China’s Electronic Surveillance Program Targets Muslims »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

FDM Group

FDM Group

FDM Group is an international Professional services company with a focus on IT. Services offered include Software Testing, and Information Security with a focus on operational security and compliance.

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium was created to encourage use-inspired research, training and technology awareness in cybersecurity.

Verimatrix

Verimatrix

Verimatrix is a global provider of innovative cybersecurity solutions that protect content, devices, software and applications.

SCIPP International

SCIPP International

SCIPP’s courses are based on internationally recognized best business practices for security awareness, for both technical and non-technical staff and to comply with regulatory mandates.

Semperis

Semperis

Semperis is an enterprise identity protection company that enables organizations to quickly recover from accidental or malicious changes and disasters that compromise Active Directory.

Communications Authority of Kenya

Communications Authority of Kenya

The Authority is responsible for facilitating the development of the information and communications sectors including; broadcasting, telecommunications, electronic commerce and cybersecurity.

Squalio

Squalio

Squalio is an information technology group that delivers solutions and services for secure and effective IT management.

QNu Labs

QNu Labs

QNu Labs’s quantum-safe cryptography products and solutions assure unconditional security of critical data on the internet and cloud across all industry verticals, globally.

Calypso AI

Calypso AI

Calypso AI build software products that solve complex AI risks for national security and highly-regulated industries.

NSR

NSR

NSR provide trusted solutions that deliver positive business outcomes for our clients in cybersecurity and data protection challenges.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Orchestrate Technologies

Orchestrate Technologies

Orchestrate Technologies provides computer network and IT managed services for small and mid-market clients as well as small enterprise businesses.

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.

Mesh Security

Mesh Security

Mesh Security transforms security data, tools, and infra for enterprise-wide visibility and control.

Konsulko Group

Konsulko Group

Konsulko Group offers embedded Linux software and hardware development and Yocto Project services.