The Internet is to be used with caution and care. Today’s threats are quickly changing, and security tools are not foolproof. Your good conduct and vigilance are essential. Do not click on unsafe links or windows and do not agree to install anything that you did not voluntarily seek out.
We have put together a list of the best practices for you so that you can protect yourself against risks related to the Internet:
ANTIVIRUS & FIREWALL
It is important to protect your computer by installing antivirus software and a personal firewall. It is recommended that you configure your antivirus software to update automatically.
A firewall filters incoming and outgoing data and reduces the risk of hacking.
BACKUPS & UPDATES
Be sure to regularly update your operating system, browsers, and other software (Adobe, Java, etc.). By configuring these applications to update automatically, you significantly reduce your exposure to attacks from hackers.
PASSWORDS
It is not recommended to that you save your passwords on the workstation itself, particularly for sensitive applications.
Its length and complexity are the key security factors of a password, as well as changing it regularly. A 10-character password ensures a good level of security if it includes a mixture of lowercase letters, uppercase letters, numbers, and special characters*. It will be easier to memorize if, for example, it is based on parts of a complete sentence.
*Special characters cannot always be used, as it depends on the system
Do not use words published in dictionaries or information about those close to you (surnames, first names, birthdays, etc.).
Use different passwords to access each of your applications, particularly for all applications containing personal and financial data, as well as those whose misuse by a hacker would cause harm.
INTERNET CONNECTION
Access from public Wi-Fi points presents significant dangers for the security of data passing through them, which can be easily intercepted. We recommend that you install an application that creates a secure channel (VPN). If you do not have one, do not sign into your sensitive applications (your e-banking, for example) or make payments on the Internet using a hotspot.
e-BANKING ACCESS
In order to maintain a good level of security when you access e-banking, follow these recommendations:
PERSONAL DATA
Never respond to an e-mail that asks you to disclose personal information. Our bank never contacts its customers by e-mail to ask them for personal data.
In general, consider any information that you place on the Internet to leave a permanent trace. The right to be forgotten does not guarantee that your information has not been intercepted, sold, or copied by third parties.
PORTABLE DEVICES
Your portable devices contain increasingly sensitive information (personal data, payments systems, etc.), and their protection requires applying the following principles:
The Internet presents various kinds of dangers, which are constantly changing. Certain types of risk are documented below:
VIRUS
A virus is usually a code that installs on your workstation without your knowledge and interacts with its elements (components, data, etc.), often maliciously.
Antivirus software can detect the signature of known viruses and block them. The predictable behaviors of viruses can also be identified by certain security solutions in order to identify unknown viruses.
An antivirus solution is only effective if its database of signatures is regularly updated. Try to set your antivirus software to automatically update.
WORM
A worm is a type of virus whose primary objective is to spread on a large scale, discreetly and with little impact, in order to exploit the workstation’s resources often for malicious purposes (spam, denial of service attack, etc.)
TROJAN HORSE
A Trojan horse is a virus made up of complex parasitic codes that install in several stages and expand their scope of malicious activities little by little. For example, they may retrieve all the data that you type on your keyboard or capture the screens that you view. The newest Trojan horses aim to be resilient and adapt quickly to counter-measures in order remain on the infected computer. Some even go so far as to delete competing viruses that could interfere with their operation or reduce their camouflage abilities.
Unlike a worm, a Trojan horse does not spread.
HOAX
This is an e-mail containing false stories. The objective is for the text to be sufficiently catchy so that recipients send it to their usual contacts. In its malicious version, the message contains a link or attachment.
SOCIAL ENGINEERING
Social engineering is the use of your trust, naiveté or ignorance by hackers to have you perform acts that go against your interests, such as providing passwords or confidential data. Social engineering attacks are usually performed after a thorough study of the targets, particularly by collecting all the information freely available on the Internet (especially on social networks). Telephone calls are part of the arsenal used by hackers to influence their victims.
PHISHING
Phishing usually takes the form of an e-mail that simulates an official communication asking recipients to click a link provided in the message. Users are then diverted to pages that are very similar to the official site. A hacker’s objective is to obtain the data you enter, and particularly the data that enables users to log into the true official site or bank card data.