Staying Safe Online

Staying Safe Online

Staying Safe Online

At Nectar, we are constantly monitoring for any suspicious activities online and from time to time we block accounts.  Whilst the actions of fraudsters and online hackers are criminal we can all take extra care of our own accounts by following a few simple guidelines to stay safe online. 

Creating a Strong Password  

A good way to create a strong and memorable password is to use the first letters from a memorable phrase, perhaps from a song or quotation. Numbers and symbols can be used to add additional complexity and strength.

Thunder bolt of lightning, very very frightening becomes, 7tBoLvvF88%

Be creative and use words memorable to you, so that people can’t guess your password. Your social media accounts can give away vital clues about yourself so don’t use words such as your child’s name or favourite sports team which are easy for people to guess. 

Cyber criminals are very smart and know many of the simple substitutions we use such as ‘Pa55word!” which utilises symbols to replace letters. 

Never use the following personal details for your password:

  • Current partner’s name
  • Child’s name
  • Other family members’ name
  • Pet’s name
  • Place of birth
  • Favourite holiday
  • Something related to your favourite sports team

It is important that you change your passwords regularly. Make sure you set different passwords for all of your online accounts so that if one of your accounts was accessed by someone other than you, they would not be able to access any of your other online accounts.

Securing your Device

The Importance of Installing Antivirus Software on your device?

Antivirus software is an important tool to help prevent online attacks against computers and mobile devices. Not every type of cyberattack can be prevented with antivirus software, but it can be a great asset when trying to prevent intrusion into a computer, whether mischievous youths seeking a thrill or a hardened cybercriminal looking to exploit billion-dollar companies, will stop looking to find ways to commit fraud,

Although not every intrusion into a computer is meant to cause damage or steal valuable information, that doesn’t mean that the attack isn’t dangerous. All intrusions into a computer exploit what is known as a vulnerability, or a weakness in the computer’s operating system or other software that can act as an access point to an attack. Once even the most innocuous of an intrusion exploits a vulnerability, it basically sends a signal to others that this computer has been infiltrated. This opens the door wide open to much worse attacks.

When looking to purchase antivirus software, make sure to purchase a trusted and well known, subscription-based program. This is important, as the makers of this type of software will be able to keep their subscribers’ computers protected with real-time updates that scout out the latest threats.

 

Make sure you keep your device’s software up to date.

Software and app updates contain vital security updates to help protect your devices from cyber criminals.

Cyber criminals use weaknesses in software and apps to attack your devices and steal your identity. Software and app updates are designed to fix these weaknesses and installing them as soon as possible will keep your devices secure. 

You’ll often receive a prompt on your computer, smartphone or tablet to inform you that a software or app is ready to be updated. Don’t ignore this message. The few minutes it takes to download and install the updates could save you a significant amount of time and trouble in the long run, reducing the risk of you falling victim to identity theft. 

Software and app updates don’t have to get in the way of what you’re doing. You can choose to install them at night whilst asleep when your device is plugged in or set your mobile or tablet to automatically update them when you are connected to Wi-Fi. So why not have a look at your devices and install your software and app updates.

What are you Protecting Yourself Against?

What is Phishing?

Phishing is the attempt by criminals to obtain sensitive information such as usernames, passwords, and account details such as Nectar card number, to commit fraud, by disguising their email as a legitimate communication from a company such as Nectar.

Always look out for emails from cyber criminals. Ask yourself if you were expecting the email and check the address to ensure it has come from a sender you recognise.

Nectar will never ask a customer to reveal their password or ask for any financial details to access your account.  Look out for any emails that ask you to provide these types of details  and when logging into Nectar, always make sure you see the green padlock in your browser bar.

If you have noticed any missing points from your Nectar account, contact the helpline on 0344 811 0811 or get in touch via chat on our contact page

Useful Government Advice

https://www.cyberaware.gov.uk/