Cybersecurity and Data Protection for VET Operators
    Play Audio    |    Download content: /    |   

What is cybersecurityClick to read

The online world has certain dangers that can compromise our security, and we must know how to avoid potential frauds, crimes and scams.

Cybersecurity consists of a set of practices to defend informatic systems from cybercrime. It covers many areas, such as network security, app security, data protection…


Dangers of the InternetClick to read

To know how to avoid potential dangers, we must be aware of them first. The most common online risks are:

  • Spam: Emails without any real interest or usefulness;
  • Phishing: Emails that appear to come from a legitimate source, that are intended to steal information, money or introduce malware. They may offer a product, service or reward; or on the contrary, threatening with consequences or risks if you don’t comply with the message;
  • Malware: It’s the abbreviation of “Malicious Software”. It is a program or code designed to cause damage to the system or user, either by information theft, diminishing or altering software functionality or deleting data;
  • Cyberbulling: It is harassment carried out on social networks. Through the use of profiles on social media, hostile messages or offensive content for other users are spread;
  • Piracy: Piracy is the copying and distribution of copyrighted multimedia content, and is illegal when it is done for profit. Although it helps the author reach more people, it may not benefit the creator of the content, as he or she does not receive money directly from it. Users can also be harmed by downloading files from unsafe sites, which may be fake or contain malware.


All these cybercrimes may bring serious consequences:

  • Identity theft.
  • Information theft or ransom.
  • Computer equipment damage.
  • Communication interruption.
  • File corruption.
  • Denial of service.
  • Personal damage.
Tips for staying safe onlineClick to read

  1. Keep your software, browser, and other applications that have access to your information up to date;
  2. Value your privacy. Do not share personal information on the Internet;
  3. Do not trust suspicious links or emails. Do not open emails that identify themselves as a known company, but to which you have not provided your contact or information. A hint that can help us detect a fake message are the spelling or writing mistakes;
  4. Do not open any links attached to unsolicited emails or emails from strange senders. We can know that a page is secure if it starts with https://, although we must take into account that not all safe pages have authentic or valid content;
  5. Investigate before downloading files or installing applications, as they may infect your device;
  1. Use strong passwords, with +8 characters and a combination of numbers, letters and symbols. Avoid using personal information (such as your name or birthday). Do not write your passwords down;
  2. Practice netiquette. Netiquette is a set of rules and tips to guarantee a healthy online coexistence. This includes polite communication, treating others as you would in real life and respect other users’ time.


Data protection
What is data protection?Click to read

Every electronic device has sensible information we must protect from the dangers of the Internet, such as personal data, profile passwords, location, IP address….

Because of this, we must only browse safely on the Internet, but also protect our device from any external threat.