Cyber Security
Sappi

Welcome to the next phase in the Sappi Cyber Security campaign! Your mission is to make sure you have what it takes to create the most impenetrable passwords and protect yourself from the potential dangers of information theft through e-mails because…

Anyone can be a Password Spy.

How vulnerable is your private information? Potential online dangers concerning passwords and e-mails include:

  • Keystroke logging – Spies can gain info on which keyboard keys are being used when typing, thus potentially gaining vital personal info about you, such as your password.
  • Fake links in e-mails – Which automatically install viruses or keylogging software on your system when you click on them.
  • Malware – Malicious software that loads as soon as the e-mail is opened, infiltrating your system with viruses and tracking software.
  • Links to HTTP – Fake or unsafe links, created by scammers to fool you into giving out precious private info.

Prevent your private information from being infiltrated by online spies.

Some simple steps include:

  • Modify or change your password every 3 – 6 months.
  • Use upper, lower case letters, symbols and numbers in your password to make it more impenetrable.
  • Always ensure when you enter your password into a log in field that the page link is safe (and the URL starts with https://)
  • Think twice, don’t just open any e-mail or click on any embedded links in e-mails. It might direct you to a fake site or download third party infiltration software.
  • Label any outgoing mails with sensitive info as Confidential, so that it can’t be copied and re-used by others without your consent.
  • Remove all emotions when dealing with your inbox. Scammers and spies often prey on basic human emotions & traits such as greed, memory, fear & charity.
  • Always log out when you are done using your mail or personal online services, especially if you’re using a public or work computer.

Did you know?

  • The most common word used in passwords is Bella. Bella is a common pet name and most people use their pet names in their passwords.
  • It takes a spy only 40 seconds to hack into your computer/mobile, iPad or Tablet.
  • Over 50% of people still click on Phishing links in e-mails.
  • Hackers use software that cycles through text to guess your password. If you use upper and lower case letters as well as special characters, then you increase the average time it takes them to get your information from seconds, to over 600 million years.
  • Most people use the same password for all their accounts.
  • Most hackers catch savvy surfers with fake newsletters to which the user did not subscribe. When the user clicks the ‘Unsubscribe’ button, it links to a false page and download initiation for malware.
  • One in every 131 e-mails contains a malware.
  • Every day, 230,000 new malware samples are produced, and the number keeps rapidly increasing annually.
  • Almost 80% of people who are aware of all the dangers of clicking links in e-mails still continue to do so.
  • It takes most businesses almost 200 days to notice a security breach in their e-mail network. Once they notice this breach, it takes on average 66 days to recover from it.
  • Hackers can use stolen information in under 10 minutes after stealing it.
  • The top 3 most common password are:
    1) 12345
    2) 123456
    3) qwerty

When dealing with e-mails and passwords, it’s important to remember that you can’t be too careful because anyone could be spying on your personal information and activities.

If you come across any suspicious or illegal content while surfing the internet or checking your mails, please report it to phishingreport@sappi.com

TO BE CONTINUED…