1. Be Aware of Your Surroundings
Being aware of your surroundings is crucial for maintaining safety and security. When using your devices in public, be mindful of who is around you. Here are some precautions that you can take:
– Avoid using your devices in crowded areas where someone could easily snatch it.
– Stay alert and always be conscious of your environment.
– Avoid distractions, such as excessive device used when in public areas.
– Pay attention to the behaviour of those around you. Look for signs of suspicious activity. Do not hesitate to leave if you feel uncomfortable.
2. Secure Your Device Physically
When not in use, keep your devices in a secure zipped bag, pockets or inside locked storage. Never leave your device unattended in public areas, even for moment.
3. Beware of “Evil-Twin” Wi-Fi Connection
The “Evil-Twin” attack involves a cybercriminal using a device to set up fake Wi-Fi access point where you typically use free & public internet. If you connect to the fake Wi-Fi source, the attacker will be able to steal your information. The “Evil-Twin” will also be able to monitor any activity that you do on this fake Wi-Fi connection. Here are some precautions that you can take to reduce your risk:
– Avoid unsecured Wi-Fi spots. Use a mobile hotspot instead. If you really need to connect to public network, avoid one labelled “Unsecure”.
– Avoid logging into financial or personal accounts on a public network.
4. Beware of USB Drive Scams
A cybercriminal can use USB drives or a CD to steal information and gain unauthorised access to your devices and/or network. If you insert unknown devices into your computer, a cybercriminal can immediately implant a malicious code into your devices. You should never insert unknown objects into your devices.
5. Limit Device Exposure
Avoid displaying your device for too long to the public. When not in use, keep your device out of sight to reduce your risk. Consider using a privacy screen protector on your device to prevent others from viewing your screen in public to reduce the risk of a criminal being able to steal your login credentials (shoulder surfing attack).