Toughen up your passwords: Avoid using common words and common substitutions and instead use passwords that are long, and include a variation of lower case and upper case letters, numbers and symbols. Tools like password managers, such as LastPass, can also be used to manage multiple complicated passwords.
Review your account’s privacy setting: Social media platforms collect a lot of personal information including current location, contact information, employment status and history, and personal interests. Review your privacy settings on your social media accounts and make sure you are aware of what you are sharing. Consider changing your accounts from public to private to keep your information more secure.
Check your permissions: Many smart devices will have access to your location, cameras and microphones, even when they are not being used. Carefully review what personal information is being collected from your device and why it’s needed. Consider setting up different permissions for different users, with separate restricted accounts for children.
Use multi-factor authentication: In today’s world of phishing and malicious attacks to gather your credentials, using a single username and password to access your information online can be perilous. Multi-factor authentication (MFA) involves using a second method of account authentication, such as: something you know (such as a password), something you have (such as a smartphone), and something you are (such as your fingerprint).
Check to see if your financial institutions, online accounts and applications offer MFA. Apple and Google both offer MFA options for accessing your online accounts.
Here at Teck we will soon launch DUO as our MFA method to secure Teck information accessed from non-Teck devices. See here for more information.
See if you have been ‘pwned’: Have I Been Pwned is a free service that aggregates data breaches and helps people establish if they have been impacted by malicious activity on the internet. The site works by comparing your email address to databases of known security breaches. If a match is found, it gives information on what parts of your identity and data may have been exposed.
How Cyber Secure Are You?
We all have a role to play in keeping our personal information and Teck’s systems safe. Here are five tips to improve your cyber security at home, at work and on the go.
- arrow_right_alt Creating a Diversity Network in Chile
- Recognizing International Day of the World’s Indigenous Peoples arrow_right_alt