Header

Cyber Security Corner


General Cyber Security Don’t View/Download

Best Practices Do View/Download

Frequently Asked Questions (User - Department)

  • What is phishing and how can I recognize it ?
    Phishing is a type of cyberattack where attackers impersonate legitimate organizations or individuals to trick you into providing sensitive information (e.g., passwords, bank details). Be cautious of unsolicited emails or messages that contain suspicious links, attachments, or urgent requests. Always verify the sender's email address and do not click on links or open attachments from unknown sources.
  • A secure password should be at least 12 characters long and include a combination of upper and lowercase letters, numbers, and special characters. Avoid using easily guessable information such as names, birthdays, or common words. It's recommended to use a password manager to keep track of your passwords securely.
  • Software updates often contain security patches that fix vulnerabilities and protect against cyber threats. Failing to update your systems regularly can expose them to attacks, especially in critical infrastructure like power utilities, where vulnerabilities could lead to severe consequences.
  • MFA adds an extra layer of security by requiring more than just a password to access your accounts or systems. Typically, this involves something you know (password), something you have (a mobile device or token), or something you are (fingerprint). Enabling MFA makes it much harder for attackers to gain unauthorized access.
  • Always store sensitive or confidential information in secure, encrypted locations. Avoid sharing such information over unsecured methods like email or unsecured messaging platforms. Be cautious about who you share sensitive information with and ensure that it’s only disclosed to authorized individuals.
  • If you suspect a security breach, immediately report it to your IT or cybersecurity team. Disconnect your device from the network to prevent further damage, and do not attempt to fix the issue on your own. Your IT team will guide you through the appropriate steps, such as running malware scans and securing accounts.
  • Network segmentation involves dividing the network into smaller, isolated segments to limit the potential spread of cyberattacks. In a power utility, it’s especially critical to prevent unauthorized access to sensitive control systems and infrastructure by isolating them from less critical networks.
  • Public Wi-Fi networks are less secure, making it easier for attackers to intercept your data or launch attacks. Avoid accessing sensitive or work-related information while connected to public Wi-Fi. If necessary, use a Virtual Private Network (VPN) to encrypt your internet connection.
  • Be cautious of emails from unknown senders or those that ask for sensitive information. Look for signs such as misspellings, unexpected attachments, or requests that seem urgent or out of the ordinary. If you suspect an email is phishing, report it to your IT department and avoid clicking any links or opening attachments.
  • A cyberattack on a power utility can lead to disruptions in services, safety hazards, financial losses, and reputational damage. In critical infrastructure, such attacks can also result in significant risks to public safety. That’s why it's important for all employees to be vigilant and follow cybersecurity best practices.
  • External devices such as USB drives can carry malware or other harmful software that could infect your computer or the utility’s network. Always ensure that external devices are scanned for malware before use and avoid plugging in untrusted devices to any work systems.
  • If you receive a suspicious phone call or message, particularly one requesting sensitive information or financial details, hang up and verify the caller's identity by contacting the organization directly using a trusted phone number. Do not provide personal or work-related information to unsolicited callers.

Important Websites