Site icon Cyber Security & Awareness

Unit 4 – Question 2_ Vo Thi Cam Loan

Biometric Security

As humans we all have unique patterns in our fingerprints, voice, face composition and eyes. These are unique to each of us and technologists have discovered that they can be used as our very own keys to unlock our digital devices or to access information. You may have seen facial recognition or fingerprints being used on mobile phones or the eye being used to unlock a secure safe in a bank in a movie.  We can train a virtual assistant on our mobile phone using Artificial Intelligence to recognise our voice to unlock our phone and perform actions for us.

This area is known as biometric security. Biometric security measures the unique characteristics of a person’s fingerprint pattern, voice, face and iris or retina to identify patterns and match the unique characteristics. They are used as an alternative to PIN codes in mobile phones, to access buildings, in banking apps and for immigration purposes.

Tip: If you receive a prompt to update your device’s software you should do so as soon as possible.

How can I activate 2FA to protect my most important accounts?

You should activate 2FA now, starting with your important accounts:

If you have a lot of email accounts, prioritise those that are linked to your online banking or other important services.

The steps for activating 2FA are different depending on the account, device or software application.

For more information on how to turn on 2FA read our step-by-step guides.

Tip: Check your backups regularly so that you are familiar with the recovery process, and ensure your backups are working properly.

How can I create a passphrase?

Create passphrases that are:

If a website or service requires a complex password including symbols, capital letters, or numbers, you can include these in your passphrase. Your passphrase should still be long, unpredictable and unique for the best security.

Tip: Always remember to never reuse a passphrase across multiple accounts.

Device Security

Treat your phone like your wallet. Keep it safe and with you at all times.

 

Software and App Security

Data Security

Connectivity Security

How do I recognise scam messages?

It can be difficult to recognise scam messages. Cybercriminals often use certain techniques to trick you. Their messages might include:

Tip: Think Before You Click

Remember: No IT person, government department or business will contact you and ask for your login details.

* What information should I avoid sharing?

Avoid sharing information (including photos) online that cybercriminals can use to identify you, manipulate you through a scam or deduce your account recovery questions. This may include your:

Any other personal information that can be used to target you

Exit mobile version