In today’s interconnected world, our digital lives are more vulnerable than ever. With cyber threats on the rise, safeguarding your personal and professional information has never been more crucial. In this blog post, we’ll explore the importance of e-safety and share practical tips to keep your digital life secure.

This is the first part of my blog post series coverage of 2023 PAX, a videogames convention, where yours truly only goes for the lectures!

These notes were compiled from the talk “Keeping it eSafe and Secure with Oline Games, Streaming & Apps” presented on 8th October 2023.
Presenters: Nick Commins (Legal Counsel – Cyber CX)
Fraser Metcalf (Solution Lead, Cyber Defence – Cyber CX)
Jay Baneriji (Digital Forensics & Investigation Expert – Cyber CX)
Vikki Grouious (Security Testing & Assurance Leader – Cyber CX)

Personal Disclosure: I have been a recipient of Cyber CX’s outputs in the past. My views are my own, and whilst I was impressed with their work, this is not an endorsement of the organisation.
Photo by FLY:D on Unsplash

Understanding the Risks

One of the first steps in e-safety is understanding the risks. Your online presence, connections, and activities can make you a potential target for various threats, including cyberattacks and identity theft. Attackers, including foreign actors, may exploit your connections to reach others through you, making it essential to stay vigilant (even if you think you are “just” a twitch streamer/”tiktok”/”instagram influencer”).

Protecting Your Online Identity

  1. Password Managers for Elderly Relatives: Managing passwords can be challenging, especially for elderly relatives. Encourage them to use password managers to create and store complex, unique passwords for different accounts. One of the other options is to have pass phrases that they can use to handle differnt accounts.
  2. Two-Factor Authentication (2FA): Enable 2FA for your accounts whenever possible. Avoid using email or SMS for 2FA, as they can be vulnerable to interception. Instead, use authentication apps or hardware tokens for an extra layer of security.
  3. BitLocker for HDD: Protect your data by encrypting your hard disk drive. BitLocker, for example, can prevent unauthorised access and data theft, even if the physical drive is removed and placed in another system.
  4. Beware of Hot Linking: Hot linking is a technique that allows attackers to quickly bypass security measures by moving a hard drive to another computer. Encrypting your data and using secure boot options can mitigate this risk.
  5. Avoid Facial Recognition: Facial recognition technology may be convenient, but it’s relatively easy to bypass. Instead, use more secure methods for device authentication.
  6. Beware of Malicious Charging Cables: Be cautious about using charging cables, USB, or HDMI, from untrusted sources. These cables can potentially act as a conduit for malicious scripts, compromising your device’s security.

The Role for Organisations

Organisations are not immune to cyber threats. Sometimes, security incidents can go undetected for a while. Even with security software in place, it’s crucial to have a dedicated team monitoring error reports and actively looking for signs of suspicious activity.

Personal eSafety Measures

  1. Enhance Your Personal Security: Cybercriminals often target the easiest victims. Strengthen your security by using best practices, such as strong and unique passwords, regular software updates, and staying informed about the latest threats.
  2. Assess Risks Carefully: If you receive suspicious approaches or threats, assess the risks carefully. Consider whether the threat is credible and take measured actions to protect yourself.
  3. Check Your Online Exposure: Services like “Have I Been Pwned” can help you check if your personal information has been compromised. This knowledge can help you take appropriate actions to secure your accounts.
  4. Report Threats: If you encounter threats, harassment, or cybercrimes, don’t hesitate to report them. Reach out to law enforcement, the relevant social media platform, or the eSafety Commissioner’s office for assistance. Be persistent as well, it can pay to find the senior people on LinkedIn from the organisation where the threat came from, and complain to them (using various email combinations) to ensure your voice is heard – but always be respectful!
  5. Seek Help from eSafety: In Australia, the eSafety Commissioner plays a vital role in addressing online safety concerns. They offer a holistic federal approach to combating cybercrimes and supporting victims (where state-based police may have limited jurisdictions).
  6. Contact the OAIC: The Office of the Australian Information Commissioner (OAIC) can assist in addressing privacy and data protection issues. Don’t hesitate to reach out if you have concerns.

Stay Vigilant

In the digital age, staying vigilant is the new price of freedom. Protecting your online identity, understanding the risks, and reporting threats are essential components of e-safety. Take control of your digital life, and remember that proactive measures can make a significant difference in safeguarding your online presence.

The Short Version:

  1. Google Yourself: Regularly search your name online to monitor your digital footprint.
  2. Have You Been Pwned: Use services like “Have I Been Pwned” to check if your data has been exposed in breaches.
  3. Check Your Credit Score: Monitor your credit score for sudden drops or unauthorized credit card charges.
  4. Always Be Vigilant: Stay alert, be cautious, and take action to protect your digital signature.

Remember, your digital safety is your responsibility. By following these tips and maintaining e-safety best practices, you can reduce the risk of falling victim to cyber threats and enjoy a safer online experience.

Stay safe and stay secure in the digital world!

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.