Here are ten basic tips that you can use to prevent cybercrime:

  • Keep computer systems up to date.
    • Cyber criminals will use software flaws to attack computer systems frequently and anonymously. Most Windows- based systems can be configured to download software patches and updates automatically.
  • Protect your computer.
    • Be cautious about opening attachments or clicking on links in emails and remember that free apps (games, ringtones, screen savers) can hide viruses or spam.
  • Keep your firewall turned on.
    • A firewall helps to protect your computer from hackers who might try to gain access to crash it, delete information, or steal passwords and other sensitive information.
  • Protect your personal Information.
    • Keep social security numbers, account numbers, and passwords private, as well as specific information about yourself, such as your full name and date of birth.
  • Install and update antivirus software.
    • Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without the users’ knowledge. Most types of antivirus software can be set up to update automatically.
  • Choose a strong password and protect it.
    • Create passwords with eight characters or more and that use a combination of letters, numbers, and symbols. Change your passwords regularly, and don’t use the same password for everything.
  • Secure your wireless network.
    • Wi-Fi (wireless) networks at home are vulnerable to intrusion if they are not properly secured. Review and modify default settings. Public Wi-Fi, a.k.a. “Hot Spots”, are also vulnerable. Avoid conducting financial or corporate transactions on these networks.
  • Review financial statements regularly.
    • Reviewing credit card and bank statements regularly will often reduce the impact of identity theft and credit fraud by discovering the problem shortly after the data has been stolen or when the first use of the information is attempted.
  • If it seems to good to be true, it is.
    • No one is going to receive a large sum of money from a dead Nigerian politician, win a huge lottery from being “randomly selected from a database of email addresses,” or make big money from “passive residual income a few hours each day working out of your home.”
  • Turn off your computer when not in use.
    • With the growth of high-speed Internet connections, many opt to leave their computers on and ready for action. The downside is that being “always on” renders computers more susceptible to attack by cyber criminals.