Everyone is an attractive target to cyber criminals. They actively seek the largest reward with the least amount of effort. Your personal data could be collected in a batch of stolen files and used for malicious purposes.
Do not fall victim to scams! Beware of unsolicited calls, e-mails, and online chat dialogues from people who claim they work for Microsoft and have spotted something wrong with your computer. Microsoft does not contact customers to inform them of individual issues, unless they have initiated contact with Microsoft about a computer problem they are having.
Users of Bluetooth technology can protect themselves by following these tips: disable all Bluetooth functions when not in use; always install the latest updates for your device and Bluetooth software/firmware; your device should remain on the “hidden” setting and should not be “discoverable”; be cautious near open Wi-Fi hotspots if you are using Bluetooth in public. Your connection could be intercepted; only use Bluetooth on secured connections; and enable authentication and encryption if it is available for your device.
When you are working on your office computer or device, make sure you adhere to your employer’s policies and don’t install unauthorized software. Most employers mitigate this risk by having administrators set user privilege restrictions to prevent anyone from installing unauthorized software. If there are no restrictions or policies in place, we recommend creating an administrator account and then creating a general user account with restricted privileges.
Employing the principle of least privilege (POLP) assists in limiting access; assigning people the lowest level of user rights for them to still do their jobs. This reduces administrative vulnerabilities on the computer by eliminating unnecessary privileges that can result in more serious network exploits and computer compromises.