Representative of the Rule of Law Department|@Everyone, have you plugged these network security "vulnerabilities"?

  2021 Cyber ​​Security Promotion Week is here!

How much do you know about network security "vulnerabilities", who are online every day?

Do you know how to protect your personal information?

Representatives of the rule of law class in this issue will popularize cyber security knowledge for everyone, and say no to security vulnerabilities and hidden risks!

Vulnerability one:

Disclosure of sensitive personal information at will

  A single photo can reveal the information of all family members, and it is easy to create opportunities for criminals to cheat and steal, especially the information of the elderly and children. Pay attention to protection, including names, kindergarten and school addresses, etc.

  1. Pay attention to baby drying

  Some parents who love to expose their children have not turned off the "Nearby People" setting in WeChat. The scammers can search for "Nearby People" through WeChat, and they can easily obtain information about their children.

  2. The itinerary must be kept confidential

  When going out, the schedule, whereabouts and other information should be kept confidential, and criminals should not be given the opportunity to steal.

Therefore, do not "show" tickets, passports, air tickets, etc. that can show your name and ID number while you are out.

  3. Protect privacy

  Try not to show obvious features in the photos, such as your house keys, license plate numbers, and ID cards, driving licenses, and passports.

Vulnerability 2:

The password is too simple or all accounts use the same password

  We are not unfamiliar with passwords. We need to enter a password whenever we log on to forums, emails, websites, online banking or withdraw money at a bank. The security of the password is directly related to our work information, personal privacy and property security.

  Pay attention to the following points:

  1. Don't use the same password for all accounts

  2. Important accounts should use more secure passwords

  3. A simple password can be set for occasionally logged in forums

  4. E-mail, online banking, and company information systems used daily need to set up complex passwords

  5. Do not set the same password for forums, email addresses, online banking, and information system accounts

  Here are a few tips for everyone:

  First-form phrase splicing

  For phrases you are familiar with, it is best to have numbers and letters combined with upper and lower case; for example, "5G时代@" to convert the password "5Gshidai@"

  Sentence-formed prose of the second form

  Use the first letter of the pinyin of favorite poems plus numbers and special symbols to form a password; for example, "I am born to be useful". The first letter plus numbers and special characters form a password "tswcbyy@6"

  Third type number for text

  You can replace Chinese characters with corresponding Arabic numerals, such as "February spring breeze like scissors" and convert it into a password "2ycfsjd@"

  Fourth formula Chinese and English matching

  Choose a familiar sentence, replace some with pinyin and the rest with English words, and add numbers and special characters to combine.

Such as "I love work" "wo love work@7"

Vulnerability three:

Use public Wi-Fi without a password

  In order to meet the needs of Internet users to surf the Internet on mobile phones, many businesses are now equipped with Wi-Fi to attract consumers.

Although "public Wi-Fi" is convenient, it also has many security risks.

Hackers like to set up ambushes in the "public Wi-Fi". Netizens will be recruited if they are not careful, which can result in loss of money or loss of personal information.

  How to use "Public Wi-Fi" safely on mobile phones?

Here are some tips to teach you:

  1. The phone settings prohibit automatic Wi-Fi connection

  2. Reject Wi-Fi from unknown sources

  3. Use security software to detect Wi-Fi

  4. Do not use unfamiliar Wi-Fi for online shopping

  5. Be wary of multiple Wi-Fi with the same or similar names in the same area

Vulnerability four:

Relax your vigilance against "acquaintances" phishing emails

  Phishing emails are when hackers pretend to be people trusted by users such as colleagues, partners, friends, family members, and induce users to reply to emails, click on malicious links embedded in emails, or open email attachments to implant Trojan horses or malicious programs, thereby stealing sensitive user data And other cyber attacks.

  There are "five essentials" to prevent phishing emails: antivirus software must be installed; login passwords must be kept secret; email accounts must be bound to mobile phones; public and private mailboxes must be separated; important files must be protected.

  Also, don't trust the "display name" shown in the sender's address.

Because the display name can actually be set arbitrarily, pay attention to reading the full name of the sending mailbox; do not open links in unfamiliar e-mails easily; do not relax your vigilance on "acquaintances" e-mails.

If you receive an email from a trusted friend or colleague, and you have doubts about the content of the email, you can directly call them to verify.

Vulnerability five:

Scan the QR code on an unknown website or APP

  In the era of mobile payment, scanning QR codes has become the most common thing in our lives.

However, these QR codes seem convenient, but if you are not careful, you may have to pay the price of money loss.

  The following are several common QR code fraud tactics:

  1. When shopping in a mall, I met a "salesman" who said "scan the QR code" to give away free goods. Everyone must not scan the code with the idea of ​​"don't do it for nothing".

Some criminals took advantage of this psychology to induce victims to scan the QR code in various ways.

The victim logged into the preset website without knowing it and automatically downloaded the Trojan horse virus, resulting in the theft of personal information and online banking passwords.

  2. Some criminals will send a QR code to everyone via WeChat, falsely claiming to scan the QR code to help check the reputation of the Taobao store and get a commission.

Once the citizen enters the mobile phone number and bank account number, the balance in the WeChat wallet will be transferred shortly.

  3. Someone saw an "Illegal Parking Ticket" on the car window, with a QR code attached to the bottom of the list. If the owner scans the QR code to enter, a 200 yuan transfer interface will appear on the screen.

This method is more deceptive than traditional fraud, the masses are easily deceived, and the social harm is considerable.

  Therefore, we must carefully screen out virtual identities on the Internet, and we must not trust the two-dimensional code of unknown origin. When filling in the account number and password, we must verify the authenticity of the other party’s identity to prevent being deceived.

Once you find that the money has been transferred, call the police in time.