Cyber Tip of the Day - Public Computers - Cybersecurity Awareness Training

Public computers that offer you Internet access are high-risk spaces where your personal and sensitive information can and will get stolen.

Here are some tips to protect yourself:

  • Disable “Autocomplete” and “Save Password” features in the browser before you start browsing.
  • Consider using private or incognito mode in browsers that makes sure nothing is stored on the public machine.
  • Do not use toolbars and don’t click on ads that appear on the sites you visit.
  • Be wary of anyone trying to snoop over your shoulder. Avoid entering sensitive information such as credit card numbers or financial details while using public computers.
  • Don’t leave your machine unattended while you’re using it.
  • Clear the temporary internet files and browsing history when you finish using the public computer.
  • Remember to logout of websites when you’re done working. Don’t just close the browser or type another site address in the URL.
  • If possible, avoid using public computers such as those in hotel lobbies or public libraries altogether. You never know who’s been using them and what’s on them.

Be Smart. Be Aware. Be Secure. ERMProtect.

 

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

Intelligence and Insights

New HIPAA Security Rule

New HIPAA Security Rule Tightens Cybersecurity for Healthcare Organizations

If published, the HIPAA Security Rule changes could pose significant operational and budget challenges for CISOs in the health sector …
FFIEC CAT to the CRI Cyber Profile 2.0

Why Some Financial Institutions Are Transitioning from FFIEC CAT to the CRI Cyber Profile 2.0

While the FFIEC does not endorse any specific tool, many financial institutions have started adopting the Cyber Risk Institute’s (CRI) Cyber Profile 2.0 …
GLBA Risk Assessments

GLBA Risk Assessments: A Key 1st Step in GLBA Compliance

The GLBA risk assessment is an organization’s starting point for GLBA compliance. We break it all down in this GLBA risk assessment overview …