The 5 C’s of Cyber Security Downloads
Here are our free downloads
With valuable information to help you navigate your cyber-safe journey.
The 5 C’s of Cyber Security Guidebook – Download Here
Protecting What is Precious to You – Download Here
No Social Media Marketing Guide – Download Here
Our Services – Download Here
Our Manifesto – Download Here
Our Privacy Policy – Download Here
Did you know that mostly you are not being ‘hacked’
Scammers are actually ‘phishing’ and we take the bait…..
If you would like to deepen your understanding of the world of cyber-crime,
here are some resources that may be of interest.
If you have been involved with a Cyber security incident, we recommend you seek our support in the first instance. You can also report the incident and seek support at the Australian Signals Directorate, An Australian Government Cyber Security Support Service.
If you wish to see the Australian Government cyber security recommendations, you can visit their website here. https://www.cyber.gov.au/learn-basics
Social engineering is a manipulation technique that exploits human error to gain private information, access, or valuables. In cybercrime, these “human hacking” scams tend to lure unsuspecting users into exposing data, spreading malware infections, or giving access to restricted systems.
Attacks can happen online, in-person, and via other interactions – want to know more?
https://slnt.com/blogs/insights/social-engineering-tips-to-make-yourself-safe-from-this-hacking-tactic
Lock your Credit File to protect yourself from identity theft and Cyberfraud. Credit Savvy offers a free app that allows you to freeze your credit file from being checked, stopping potential creditfraud should you be a victim of a cyberbreach. There is a simple app to install and you can lock and unlock your credit file from there. But you do need to remember to unlock your credit file if you legitimately want apply for credit. Aside from 2FA / MFA, freezing your credit is the strongest way you have to protect yourself from credit fraud.
https://www.creditsavvy.com.au/savvyshield
Email can be intercepted and read by people you may not want to see what you have sent – This is known as an MITM (man in the middle attack).
These MTM attacks can even modify an attachment on your email. If your attachment is an invoice, they may change the Bank account details on your invoice to their own bank details, send on the modified attachment and your customer will pay them and not you!
If you receive and email with an invoice to pay, and you have not paid to their account before, before sending payment, phone the sender and check their Account number on the invoice you received matches the details the sender has.
Remember, email and their attachments can be altered by the bad guys along the way, and you could end up paying into the wrong account. With this kind of attack, banks will not refund your money under their internet fraud policies. If incorrect payment does happen, more often than not, the actual sender will still want their payment, so you may end up paying the bill twice.
If you need to send sensitive information or attachments, it would be worth considering sending the information or attachments on a secure messaging platform. For example – Signal, Threema, or sending documents or PDF copies of an invoice for example via a secure file transfer service like Transferly.
If you are using iPhone or Mac and are correctly logged into an Apple ID with iMessage turned on and you know the receiver is on iPhone or Mac with their Apple ID setup correctly, then you could send iMessage to iMessage as Apple to Apple uses End to End encryption in Apple messages. Check for blue message bubbles, not green. Blue bubbles are encrypted – IF this sounds all to difficult, go back to Signal! Encryption on Signal is setup for you by default.
If email is the only option, consider if your email provider is reputable. We recommend Proton Mail as a secure email provider. Proton emails can be securely encrypted with a password that you will need to tell the receiver. You could phone the receiver and tell them the password, or send them an iMessage text, Signal or Threema message with the password or send them the password on an encrypted transfer service such as Transferly.
Alternatively, you could just send your sensitive information or invoice via Transferly. This service is end to end encrypted for secure sending of files, messages or passwords.
So the key here is to stay vigilant with all online transactions and check all details before sending payment to anyone.
Finally, if you have been the victim of a MITM attack, we recommend you change the password on your email address and ensure you have 2 factor authentication setup.
If you want to understand your digital footprint better and what ‘tracks’ you are leaving behind, take a look here – https://www.teachthought.com/the-future-of-learning/digital-footprints/
If you are using FREE antivirus, YOU are the product – Be aware AVAST Antivirus has been fined $16.5 Million Dollars for selling customer data collected through their Antivirus platform and Web Browser plug-in. This highlights the need to be very clear on what you sign up to online and how that service is going to make money
https://www.theverge.com/2024/2/22/24080135/avast-security-privacy-software-ftc-fine-data-harvesting
Firewalls Don’t Stop Dragons – An excellent resource for extensive instructions for cyber security. (for those geeks out there who want to go deep!) There is also a great Podcast and a Book to buy if you want a practical guide to follow. Click here to visit the Firewalls Don’t Stop Dragons Website.
NBTV.media – Hosted by Naomi Brockwell has many great resourses on her site, including videos, how to’s, and her book. An easy to follow format for those that want to understand more about their online security and privacy. Visit her site Here
For a resource that focuses extensively on Cyber Wellbeing – Its Time to Log Off – https://www.itstimetologoff.com/ – This website is full of great resources on how to recreate your digital life with more balance.
Here are some great video and Audio resources
that you can watch to skill up on your Cyber Safety.
Firewalls Dont Stop Dragons – Cary Parker
Firewalls Don’t Stop Dragons Website
Firewalls Don’t Stop Dragons Podcasts
Indicators of Account Compromise
Carissa Véliz, Privacy Is Power: Why and How You Should Take Back Control of Your Data
Naomi Brockwell – NBTV
Ditch SMS! How to convince your friends
Encrypt Your DNS (STOP Your ISP SNOOPING!)
Josh Summers – All Things Secure
STOP Using Proton & Signal? Here’s the TRUTH
12 Privacy & Security Tools I Use EVERY DAY
7 Cybersecurity Tips NOBODY Tells You (but are EASY to do)
Email Phishing Scams? Prevent Common Threats by Using the S.T.O.P Method
5 EASY Ways to Secure Your Home WiFi Network (& protect your devices!)
How to Change Your Facebook Privacy Settings (step-by-step tutorial)
STOP Giving Your Real Email Address (do this instead)
Stop Using Chrome (use THIS instead)
5 Ways to Hide Email for BEST Privacy (email aliases)
My Device was Compromised…Here’s What I Did
How to Build Internet Privacy with Pseudonyms
AI – Security Threat or Defense Tool? (AI in Cybersecurity)
Privacy is IMPOSSIBLE. So what’s the point?
I Switched Password Managers (finally)
Proton Mail:
How To Create A Protonmail account: ProtonMail Tutorial in 2023
Certo:
How To Protect Your Phone From Hackers
How to Check If Your iPhone Is Hacked in Settings
Beware of A Fake Security Alert From Apple: How to Spot Scams and Stay Protected