Cybersecurity
Cyber security is preventing, detecting and responding to cyber-attacks, which can have a wide impact on individuals, businesses, communities or countries. Cyberattacks are attempts to access or damage a computer network or computers. They can both lead to loss of money, reputation, security and theft of personal data.
Cyber-attack may lead to:
• Taking control of computers, mobile phones, critical infrastructure of companies, cities and countries
• Identity thefts
• Blocking users’ access, removing personal data
• Attacks on children and youth
• Immobilization of business services, transportation and shop supplies
Protect yourself form a cyber-attack:
• Update your software and operating systems
• Use strong passwords and two-component authentication (two verification methods)
• Beware of suspicious, non-standard actions. If in doubt, don’t click
• Don’t give an access to personal information
• Use encrypted (secure) internet communication
• Create backup files
Protect your home and/or business Wi-Fi network.
Before
You may increase your cyber security by setting up appropriate controls. Below you can find steps to be taken to protect yourself, your family and your property from a cyber-attack:
• Update your software and operating systems
• Use antivirus and firewall software to block threats
• Make use of strong password which includes 12 characters or more with upper and lower case letters, numbers and special characters. Additionally, use a password manager
• Use two-step authentication (two verification methods), such as PIN and password, that no one, besides you, knows. Consider using a separate device that can receive a code or biometric scan (e.g. a fingerprint scanner)
• Beware of suspicious activities that require you to do something right away or your personal information and offer something that sounds too good to be true. Think before you click!
• Limit the personal information you share online. Change your privacy settings and don’t use the location feature. Don’t publish your personal data
• Choose an encrypted (secure) internet communication. Take advantage of sites that use HTTPS, when you access or provide any personal information. Don’t use sites with incorrect certificates. Select a virtual private network (VPN) that creates a secure connection
• Back up files regularly to an encrypted file or an encrypted file storage device, preferably on external storage media
• Protect your home network by regularly changing administrative passwords and Wi-Fi. When setting up the router, select Wi-Fi Protected Access 2 (WPA2) Advanced Encryption Standard (AES), which is the strongest encryption option
• Check your account and credit card statements regularly
During
• Limit the effects. Look for unexplained fees, weird bank account transactions, unexpected credit card rejections, messages you haven’t posted on social medias, and emails you’ve never sent
• Immediately change passwords for all your accounts where passwords are required
• Consider switching off the device. Take it to a professional who will scan and repair it
• Inform the devices’ owners about the attack
• Contact banks and credit card issuers. It may be necessary to block the cards that have been attacked. Report that someone may be using your identity
• Check if the software on all systems is up-to-date
• Run a scan to make sure the system isn’t infected or working suspiciously
• If you’ll find a problem, disconnect the device from the Internet and perform a full system recovery
• If the attack occurred in a public place, immediately notify the librarian, teacher or manager responsible for contacting their IT department
After
• If you believe that someone is using your personal data illegally, submit a notification to the Inspector General for Personal Data Protection
• File a notice at the police unit to obtain official confirmation of the incident
• Contact additional governmental and economic agencies depending on what information has been stolen (CEIDG, KRS, ZUS, Tax Office)
• Report the crime or the Internet fraud to the police unit responsible for prosecuting the crime