8. Cyber hygiene are the practices and steps that
users of computers and Mobile devices take to
maintain system health and improve online
security.
• These practices are often part of a routine to
ensure the safety of identity and other details
that could be stolen or corrupted
10. Malware
A malware is an intrusive software that is designed to damage and destroy
computers and computer systems. Malware is a contraction for “malicious
software.”
Examples of common malware includes viruses, worms, spyware, adware,
and ransomware
11. Viruses
• A computer virus, much like a flu virus, is designed to spread from host to
host and has the ability to replicate itself. ...
• In more technical terms, a computer virus is a type of malicious code or
program written to alter the way a computer operates and is designed to
spread from one computer to another
12. Hackers
• Computer hackers are unauthorized users who break into our computer
systems in order to steal, change or destroy information, often by installing
dangerous malware without your knowledge or consent.
• Their clever tactics and detailed technical knowledge help them access the
information you really don’t want them to have.
• Always use caution while surfing the web, and make sure your computer
programs are up to date to patch up any weak access points hackers may
try to get through.
13.
14. Phishing
• Phishing is a type of social engineering attack often used to steal user data,
including login credentials and credit card numbers.
• Phishers are well versed in the art of fraud by sending fake emails that may
look reputable, but are crafted by somebody seeking your credit card info,
passwords, or social security number.
• Again, always be careful online, especially when receiving emails that
appear “phishy” or inauthentic.
15.
16.
17.
18. Scams
• Congrats! You’ve just won an all-
expenses-paid trip to Canada! All you
have to do is send a Shs 500.000
deposit to reserve your room in a FIVE
STAR SUITE. Make sure to send your
deposit by FRIDAY or else your room
will be given to someone else.
• It’s your lucky day! Sounds amazing,
right? Well, you may know this is fake,
but unfortunately a lot of people,
including the elderly, fall for popular
scams similar to this all the time.
• Most email platforms have pre-installed anti-
spam protection so that spam emails will go
straight into the folder and never be seen. But
when it comes to phone calls, your knowledge
is your only protection
• When in doubt, don’t respond: Fraudulent text
messages, calls and voicemails are on the rise.
Just as with email, mobile requests for
personal data or immediate action are almost
always scams.
20. Create a common Digital Hygiene Policy
• Be vigilant >>think and assess before you click<<
• Always use strong passwords.
• Disable unwanted and idle services such as Bluetooth, WIFI as theses can offer an
easy way for a nearby unauthorized user to access your device.
• Connect with Care: Public wireless networks and hotspots are not secure, which
means that anyone could potentially see what you are doing on your laptop or
smartphone while you are connected to them. Limit what you do on public WiFi, and
avoid logging in to key accounts like email and financial services. Consider using a
virtual private network (VPN) or a personal/mobile hotspot if you need a more
secure connection
21.
22. Keep track of where you are logged in
• Log out all accounts after use
• While you should always sign out of accounts when you are using public devices,
there is more to keeping track of where you are logged in. We sign up for new
accounts and subscriptions every day, and often, we forget about them.
• Keep track of where you sign up and, periodically, delete the accounts that you
don’t use. You don’t want your information in places that you don’t regularly
frequent. Stay safe by always knowing who has your information.
25. Protecting your identity- Incognito mode.
Personal information is like money – Value it. Protect it: Information about you, such as what you
search for online and where you shop and live, has value – just like money. Be thoughtful about who
gets that information and how it’s collected through apps and websites
27. Software Updates:
Updating the software
you use, or perhaps
getting better versions
should be a part of
your regular hygienic
review
Hardware
Updates: Older
computers and
smartphones may
need to be updated to
maintain performance
and prevent issues.
Manage New
Installs: Every new
install should be done
properly and
documented to keep an
updated inventory of all
hardware and software
Limit Users: Only
those who need
admin-level access to
programs should
have access. Other
users should have
limited capabilities
• Back Up Data: All data
should be backed up to a
secondary source
Hard drive or cloud
storage(i.e. Onedrive,
google drive,
dropbox…)
30. Encrypting Software for Mobile Gadgets
• Kyms (keep your media safe)
• Syncthing
• OpenKeychain
• FreeOTP Authenticator
• Silent Phone
• Cyph
• Cryptomator
• Confide
• Pryvate
31. Digital Security means developing a protective routine to keep your personal and financial
information secure when using your computer or mobile device. Using strong passwords and
changing them regularly, keeping software and operating systems up to date, wiping hard
drives, and using a comprehensive antivirus will help you stay ahead of the latest cyber threats.