10 Steps to Cyber Success
- Information Security Policy
- 10 Steps to Cyber Success
- Training & Policies
- Reporting an Incident
- Phishing
- Social Engineering
- Strong Passwords
- Ransomware
- Social Networking
- CyberSafe Zooming
- Updates and Anti-virus
- Mobile Devices
- Protect Your Data
- Storing Data Securely
- Public Wi-Fi Hotspots
- Physical Security
- Cyber Security Programme
- Password Managers
- Cyber Security Inductions
- Gender-Based Violence IT Help
![]() |
1. Be aware it could happen to youOver 50% of UK crime is cyber crime. |
![]() |
2. Think before you clickCuriosity, urgency, fear and greed are just some of the tactics used to get you to bite! |
![]() |
3. Don't get caught by scamsIt's not just emails. It could be SMS, phone calls or social media. |
![]() |
4. Keep up with news and trainingComplete your online cyber security awareness training. |
![]() |
5. Keep software up-to-date and use anti-virusNew malware and viruses are released every day. Protect yourself. |
![]() |
6. Protect your passwordsKeep them unique and strong. Don't share them. Use a password manager. |
![]() |
7. Use 2 Factor Authentication on critical accountsSo you always know when and where your accounts are being accessed. |
![]() |
8. Protect your dataMake back-ups, use secure wi-fi and encryption. |
![]() |
9. Protect your mobile devicesUse a PIN or TouchID. Enable remote wipe. |
![]() |
10. Lock before you walkLock it up or lock it down before you leave it. |
Download the 10 Steps to Cyber Success (pdf) poster
- Student Experience & Enhancement Services
- Estates Services
- Finance Directorate
- Human Resources Directorate
- Procurement
- Information Security Policy
- 10 Steps to Cyber Success
- Training & Policies
- Reporting an Incident
- Phishing
- Social Engineering
- Strong Passwords
- Ransomware
- Social Networking
- CyberSafe Zooming
- Updates and Anti-virus
- Mobile Devices
- Protect Your Data
- Storing Data Securely
- Public Wi-Fi Hotspots
- Physical Security
- Cyber Security Programme
- Password Managers
- Cyber Security Inductions
- Gender-Based Violence IT Help