Cybersecurity Tip of the Day - Chargers

Cyber Tip of the Day - Chargers

To help promote Cybersecurity Awareness, we would like to start your week with a tip to stay safe online. Today's subject: Chargers.

Hackers have found ways to tamper with chargers and use them to load malware into your devices to target cyber attacks. Next time you connect your phone to a public charger, be cautious, as it could steal information from your phone and relay it wirelessly to a hacker who doesn’t even have to be nearby.

Here are some cybersecurity tips to protect yourself:

  • Avoid using those readily available, free chargers or any other such accessories available at public places.
  • If you must use a public charger, then switch off your smartphone before connecting it to the charging station.
  • Always password protect your devices. Use strong passwords. Long passphrases make excellent passwords.
  • Keep your smartphone software up-to-date and use a good antivirus solution.
  • When using public chargers protect your device from being stolen or being exchanged with an identical twin.
  • Never let any of your devices out of your sight.
  • To improve cybersecurity and help protect yourself, avoid using public chargers altogether if possible. Carry your own personal charger or a portable power bank instead.

Be Smart. Be Aware. Be Secure. ERMProtect.

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

Intelligence and Insights

pci dss in the cloud

How to Achieve PCI Compliance in the Cloud as Security Controls Evolve

The integration of cloud services with PCI DSS compliance is particularly crucial for enterprises that handle sensitive payment card information …
Digital Forensics Investigation

What Are the 5 Stages of a Digital Forensics Investigation?

In this article, we delve deeply into the five stages of a digital forensics investigation and provide tips on how to select the right digital forensics company …
Comprehensive Guide to Penetration Testing

A Comprehensive Guide to Penetration Testing – Types, Methods, Benefits and Best Practices

This penetration testing guide explains the different types of penetration testing, their benefits, and their purpose …