Cybersecurity Tip of the Day - Chargers

Cyber Tip of the Day - Chargers

To help promote Cybersecurity Awareness, we would like to start your week with a tip to stay safe online. Today's subject: Chargers.

Hackers have found ways to tamper with chargers and use them to load malware into your devices to target cyber attacks. Next time you connect your phone to a public charger, be cautious, as it could steal information from your phone and relay it wirelessly to a hacker who doesn’t even have to be nearby.

Here are some cybersecurity tips to protect yourself:

  • Avoid using those readily available, free chargers or any other such accessories available at public places.
  • If you must use a public charger, then switch off your smartphone before connecting it to the charging station.
  • Always password protect your devices. Use strong passwords. Long passphrases make excellent passwords.
  • Keep your smartphone software up-to-date and use a good antivirus solution.
  • When using public chargers protect your device from being stolen or being exchanged with an identical twin.
  • Never let any of your devices out of your sight.
  • To improve cybersecurity and help protect yourself, avoid using public chargers altogether if possible. Carry your own personal charger or a portable power bank instead.

Be Smart. Be Aware. Be Secure. ERMProtect.

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

Intelligence and Insights

GLBA Risk Assessments

GLBA Risk Assessments: A Key 1st Step in GLBA Compliance

The GLBA risk assessment is an organization’s starting point for GLBA compliance. We break it all down in this GLBA risk assessment overview …
Web Application Penetration Testing Services

Common Issues in Web Application Penetration Testing Services

Web applications are now ripe targets for hackers. Here we take a look at a few hacker attacks on web applications & how penetration testing services are critical …
Implementing NIST Risk Assessments

Implementing NIST Risk Assessments: A Step-by-Step Approach

This step-by-step guide will help organizations navigate the NIST risk assessment process effectively, leveraging the expertise of risk assessment companies and cybersecurity consulting services …