{"id":3261,"date":"2019-08-05T08:00:13","date_gmt":"2019-08-05T06:00:13","guid":{"rendered":"http:\/\/contattoblogs.timslatter.co.za\/?p=3261"},"modified":"2019-08-05T08:00:13","modified_gmt":"2019-08-05T06:00:13","slug":"the-seven-habits-of-cyber-secure-people","status":"publish","type":"post","link":"https:\/\/zcp.co.za\/main\/the-seven-habits-of-cyber-secure-people\/","title":{"rendered":"The seven habits of cyber secure people"},"content":{"rendered":"<p style=\"text-align: justify;\">It\u2019s not for nothing that cyber crime and hacking was considered 2019\u2019s number one \u201cmajor risk\u201d by the world\u2019s largest insurer, Allianz, in their latest Risk Barometer Survey. These days, it\u2019s not <em>if<\/em> the security of your electronic identity and assets will be tried by a criminal, it\u2019s <em>when<\/em>.<\/p>\n<p>While no one is completely guaranteed safe from a cyber attack, these seven habits will mean that you\u2019ll be a harder target than someone else and so, by default, cyber secure.<\/p>\n<p><strong>1. Cyber secure people never use free WiFi<\/strong><br \/>\nSouth African speaker and social media legal expert named Emma Sadleir has a wonderful saying: \u2018when something is free, <em>you<\/em> are the product.\u2019 Don\u2019t ever use a network that you don\u2019t need a password to log onto, or even one that\u2019s free. Hackers often either set up their own (very legimate-seeming) hotspots or sit in an existing one waiting for prey.<\/p>\n<p><strong>2. Cyber secure people use two-bit encryption<\/strong><br \/>\nThe more encryption you can use, the better. People who are secure online use systems where they will be told of logging on to banking and all banking steps via email or SMS and get One Time PINS (OTPs) for everything. OTPs make use of two-bit encryption and if you don\u2019t have the code, you can\u2019t complete the transaction. This sort of security is far harder for a hacker to hack and so, usually, they won\u2019t go near a bank account with two-bit encryption.<\/p>\n<p><strong>3. Cyber secure people never, ever, <em>ever<\/em> give someone else their login details<\/strong><br \/>\nThere is a chilling tale of a savvy business woman who was called by her \u2018bank\u2019. They had her ID number, they had her card number. They just needed her PIN, please. They even had a call-back mechanism which directed her to her bank\u2019s authentic call centre. She almost fell for it. Here\u2019s the thing \u2013 no bank will ever, ever ever EVER ask you to type in your PIN, say your PIN or write your PIN down. The same goes for your username and password. It doesn\u2019t matter if you\u2019re in the bank itself. Never write down, say or otherwise disclose those three things.<\/p>\n<p><strong>4. Passwords are never easily guessable with the cyber secure<\/strong><br \/>\nAnything that could be guessed at by someone who isn\u2019t your spouse or mother isn\u2019t safe for a password or PIN, including your birthday, anniversary, year you were born, address or \u20181234\u2019. That goes for your security questions that the bank asks you too. Don\u2019t just put your high school or first job \u2013 someone could stalk you on Facebook and find that out. In fact, criminals use this trick all the time.<\/p>\n<p><strong>5. Cyber secure people have varying, different passwords<\/strong><br \/>\nThis one, many of us are guilty of. Not many of us have unsecure passwords like our birth dates, 1234 or the word \u2018password\u2019 anymore. We have one strong and hard-to-guess one with upper and lowercase letters, numbers and symbols in it \u2013 but only one. It\u2019s so much easier to just remember one password, isn\u2019t it? But cyber criminals know that too, and so they know that they just need to get your details off one not-so-secure site and then it\u2019s open sesame for everything else. So, use different passwords \u2013 completely different.<\/p>\n<p><strong>6. Cyber secure people are wary of personal info on groups<\/strong><br \/>\nThose not-too-safe sites we just mentioned? Well, few are as unsafe as groups on WhatsApp, Facebook and Telegram. Especially not those really large ones where you don\u2019t know each individual on there very well. We don\u2019t care if it\u2019s the church group or the over 70 year-olds\u2019 group &#8211; don\u2019t send any personal info including bank details and your address. You never know who is part of the group and looking for information.<\/p>\n<p><strong>7. \u2026 Or Gmail<\/strong><br \/>\nThis may come as a shock, but some cyber experts consider Gmail accounts easily hacked and not too safe. The extreme popularity of them might be one reason but, just to be safe, do not send sensitive information over Gmail if you can help it.<\/p>\n<p style=\"text-align: justify;\">Remember, we can\u2019t be 100% secure online as new hacking techniques are being unceasingly developed &#8211; but we can be mindful of our online security. If you are ever in doubt, update your passwords.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s not for nothing that cyber crime and hacking was considered 2019\u2019s number one \u201cmajor risk\u201d by the world\u2019s largest insurer, Allianz, in their latest Risk Barometer Survey. These days, it\u2019s not if the security of your electronic identity and assets will be tried by a criminal, it\u2019s when.<\/p>\n","protected":false},"author":1,"featured_media":3262,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,27],"tags":[],"class_list":{"0":"post-3261","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","6":"hentry","7":"category-blog","8":"category-life","10":"post-with-thumbnail","11":"post-with-thumbnail-large"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The seven habits of cyber secure people - ZC PRETORIUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/zcp.co.za\/main\/the-seven-habits-of-cyber-secure-people\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The seven habits of cyber secure people - ZC PRETORIUS\" \/>\n<meta property=\"og:description\" content=\"It\u2019s not for nothing that cyber crime and hacking was considered 2019\u2019s number one \u201cmajor risk\u201d by the world\u2019s largest insurer, Allianz, in their latest Risk Barometer Survey. These days, it\u2019s not if the security of your electronic identity and assets will be tried by a criminal, it\u2019s when.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/zcp.co.za\/main\/the-seven-habits-of-cyber-secure-people\/\" \/>\n<meta property=\"og:site_name\" content=\"ZC PRETORIUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-05T06:00:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/zcp.co.za\/main\/wp-content\/uploads\/2019\/07\/The-seven-habits-of-cyber-secure-people.jpg?fit=770%2C280&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"anthonyb@timslatter.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"anthonyb@timslatter.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/the-seven-habits-of-cyber-secure-people\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/the-seven-habits-of-cyber-secure-people\\\/\"},\"author\":{\"name\":\"anthonyb@timslatter.com\",\"@id\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/#\\\/schema\\\/person\\\/09632d790834c4e32a2cd47620036d5c\"},\"headline\":\"The seven habits of cyber secure people\",\"datePublished\":\"2019-08-05T06:00:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/the-seven-habits-of-cyber-secure-people\\\/\"},\"wordCount\":727,\"publisher\":{\"@id\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/the-seven-habits-of-cyber-secure-people\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/The-seven-habits-of-cyber-secure-people.jpg\",\"articleSection\":[\"Blog\",\"LIFE\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/the-seven-habits-of-cyber-secure-people\\\/\",\"url\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/the-seven-habits-of-cyber-secure-people\\\/\",\"name\":\"The seven habits of cyber secure people - ZC PRETORIUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/the-seven-habits-of-cyber-secure-people\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/the-seven-habits-of-cyber-secure-people\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/The-seven-habits-of-cyber-secure-people.jpg\",\"datePublished\":\"2019-08-05T06:00:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/the-seven-habits-of-cyber-secure-people\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/zcp.co.za\\\/main\\\/the-seven-habits-of-cyber-secure-people\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/the-seven-habits-of-cyber-secure-people\\\/#primaryimage\",\"url\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/The-seven-habits-of-cyber-secure-people.jpg\",\"contentUrl\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/wp-content\\\/uploads\\\/2019\\\/07\\\/The-seven-habits-of-cyber-secure-people.jpg\",\"width\":770,\"height\":280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/the-seven-habits-of-cyber-secure-people\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The seven habits of cyber secure people\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/#website\",\"url\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/\",\"name\":\"ZC PRETORIUS\",\"description\":\"Authorised Financial Services Provider  FSP no.: 24709\",\"publisher\":{\"@id\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/#organization\",\"name\":\"ZC PRETORIUS\",\"url\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/Logo-ZCP-2017-new.png\",\"contentUrl\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/wp-content\\\/uploads\\\/2017\\\/07\\\/Logo-ZCP-2017-new.png\",\"width\":854,\"height\":530,\"caption\":\"ZC PRETORIUS\"},\"image\":{\"@id\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/#\\\/schema\\\/person\\\/09632d790834c4e32a2cd47620036d5c\",\"name\":\"anthonyb@timslatter.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/64feec57d4b1533314068fd1c7eca50dd142ab95c794eb790881bdc085bd4ae8?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/64feec57d4b1533314068fd1c7eca50dd142ab95c794eb790881bdc085bd4ae8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/64feec57d4b1533314068fd1c7eca50dd142ab95c794eb790881bdc085bd4ae8?s=96&d=mm&r=g\",\"caption\":\"anthonyb@timslatter.com\"},\"url\":\"https:\\\/\\\/zcp.co.za\\\/main\\\/author\\\/anthonybtimslatter-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The seven habits of cyber secure people - ZC PRETORIUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/zcp.co.za\/main\/the-seven-habits-of-cyber-secure-people\/","og_locale":"en_US","og_type":"article","og_title":"The seven habits of cyber secure people - ZC PRETORIUS","og_description":"It\u2019s not for nothing that cyber crime and hacking was considered 2019\u2019s number one \u201cmajor risk\u201d by the world\u2019s largest insurer, Allianz, in their latest Risk Barometer Survey. These days, it\u2019s not if the security of your electronic identity and assets will be tried by a criminal, it\u2019s when.","og_url":"https:\/\/zcp.co.za\/main\/the-seven-habits-of-cyber-secure-people\/","og_site_name":"ZC PRETORIUS","article_published_time":"2019-08-05T06:00:13+00:00","og_image":[{"width":770,"height":280,"url":"https:\/\/i0.wp.com\/zcp.co.za\/main\/wp-content\/uploads\/2019\/07\/The-seven-habits-of-cyber-secure-people.jpg?fit=770%2C280&ssl=1","type":"image\/jpeg"}],"author":"anthonyb@timslatter.com","twitter_card":"summary_large_image","twitter_misc":{"Written by":"anthonyb@timslatter.com","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/zcp.co.za\/main\/the-seven-habits-of-cyber-secure-people\/#article","isPartOf":{"@id":"https:\/\/zcp.co.za\/main\/the-seven-habits-of-cyber-secure-people\/"},"author":{"name":"anthonyb@timslatter.com","@id":"https:\/\/zcp.co.za\/main\/#\/schema\/person\/09632d790834c4e32a2cd47620036d5c"},"headline":"The seven habits of cyber secure people","datePublished":"2019-08-05T06:00:13+00:00","mainEntityOfPage":{"@id":"https:\/\/zcp.co.za\/main\/the-seven-habits-of-cyber-secure-people\/"},"wordCount":727,"publisher":{"@id":"https:\/\/zcp.co.za\/main\/#organization"},"image":{"@id":"https:\/\/zcp.co.za\/main\/the-seven-habits-of-cyber-secure-people\/#primaryimage"},"thumbnailUrl":"https:\/\/zcp.co.za\/main\/wp-content\/uploads\/2019\/07\/The-seven-habits-of-cyber-secure-people.jpg","articleSection":["Blog","LIFE"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/zcp.co.za\/main\/the-seven-habits-of-cyber-secure-people\/","url":"https:\/\/zcp.co.za\/main\/the-seven-habits-of-cyber-secure-people\/","name":"The seven habits of cyber secure people - ZC PRETORIUS","isPartOf":{"@id":"https:\/\/zcp.co.za\/main\/#website"},"primaryImageOfPage":{"@id":"https:\/\/zcp.co.za\/main\/the-seven-habits-of-cyber-secure-people\/#primaryimage"},"image":{"@id":"https:\/\/zcp.co.za\/main\/the-seven-habits-of-cyber-secure-people\/#primaryimage"},"thumbnailUrl":"https:\/\/zcp.co.za\/main\/wp-content\/uploads\/2019\/07\/The-seven-habits-of-cyber-secure-people.jpg","datePublished":"2019-08-05T06:00:13+00:00","breadcrumb":{"@id":"https:\/\/zcp.co.za\/main\/the-seven-habits-of-cyber-secure-people\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/zcp.co.za\/main\/the-seven-habits-of-cyber-secure-people\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zcp.co.za\/main\/the-seven-habits-of-cyber-secure-people\/#primaryimage","url":"https:\/\/zcp.co.za\/main\/wp-content\/uploads\/2019\/07\/The-seven-habits-of-cyber-secure-people.jpg","contentUrl":"https:\/\/zcp.co.za\/main\/wp-content\/uploads\/2019\/07\/The-seven-habits-of-cyber-secure-people.jpg","width":770,"height":280},{"@type":"BreadcrumbList","@id":"https:\/\/zcp.co.za\/main\/the-seven-habits-of-cyber-secure-people\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/zcp.co.za\/main\/"},{"@type":"ListItem","position":2,"name":"The seven habits of cyber secure people"}]},{"@type":"WebSite","@id":"https:\/\/zcp.co.za\/main\/#website","url":"https:\/\/zcp.co.za\/main\/","name":"ZC PRETORIUS","description":"Authorised Financial Services Provider  FSP no.: 24709","publisher":{"@id":"https:\/\/zcp.co.za\/main\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/zcp.co.za\/main\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/zcp.co.za\/main\/#organization","name":"ZC PRETORIUS","url":"https:\/\/zcp.co.za\/main\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/zcp.co.za\/main\/#\/schema\/logo\/image\/","url":"https:\/\/zcp.co.za\/main\/wp-content\/uploads\/2017\/07\/Logo-ZCP-2017-new.png","contentUrl":"https:\/\/zcp.co.za\/main\/wp-content\/uploads\/2017\/07\/Logo-ZCP-2017-new.png","width":854,"height":530,"caption":"ZC PRETORIUS"},"image":{"@id":"https:\/\/zcp.co.za\/main\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/zcp.co.za\/main\/#\/schema\/person\/09632d790834c4e32a2cd47620036d5c","name":"anthonyb@timslatter.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/64feec57d4b1533314068fd1c7eca50dd142ab95c794eb790881bdc085bd4ae8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/64feec57d4b1533314068fd1c7eca50dd142ab95c794eb790881bdc085bd4ae8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/64feec57d4b1533314068fd1c7eca50dd142ab95c794eb790881bdc085bd4ae8?s=96&d=mm&r=g","caption":"anthonyb@timslatter.com"},"url":"https:\/\/zcp.co.za\/main\/author\/anthonybtimslatter-com\/"}]}},"_links":{"self":[{"href":"https:\/\/zcp.co.za\/main\/wp-json\/wp\/v2\/posts\/3261","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zcp.co.za\/main\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zcp.co.za\/main\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zcp.co.za\/main\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zcp.co.za\/main\/wp-json\/wp\/v2\/comments?post=3261"}],"version-history":[{"count":0,"href":"https:\/\/zcp.co.za\/main\/wp-json\/wp\/v2\/posts\/3261\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zcp.co.za\/main\/wp-json\/wp\/v2\/media\/3262"}],"wp:attachment":[{"href":"https:\/\/zcp.co.za\/main\/wp-json\/wp\/v2\/media?parent=3261"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zcp.co.za\/main\/wp-json\/wp\/v2\/categories?post=3261"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zcp.co.za\/main\/wp-json\/wp\/v2\/tags?post=3261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}