Beware! Be-Safe!

4 EASY WAYS to stay safe online

Our online world needs to be protected. There are easy things we can do to ensure our information is safe from those wishing to steal it.

Recognize & report phishing

Most successful online intrusions result from a recipient of a “phishing” message accidentally downloading malware or giving their personal information to a spammer. Do not click or engage with these phishing attempts. Instead, recognize them by their use of alarming language or offers that are too good to be true.

Report the phish and delete phishing messages.

Use strong passwords

Simple passwords can be guessed. Make passwords at least 16 characters long, random and unique for each account. Use a password manager, a secure program that maintains and creates passwords. This easy-to-use program will store passwords and fill them in automatically on the web.

Turn on multifactor authentication (MFA)

Use MFA on any site that offers it. MFA provides an extra layer of security in addition to a password when logging into accounts and apps, like a face scan or a code sent by text.

Using MFA will make you much less likely to get hacked.

Update software

When devices, apps or software programs (especially antivirus software) notify us that updates are available, we should install them as soon as possible. Updates close security code bugs to better protect our data.

Turn on automatic updates to make it even easier.

We can all help one another ,

Did you know about Cybercrime?

Cybercrime is a criminal activity that targets mobile phone users and computer users to steal money, sensitive information and imposes a threat.

Cybercriminals are Fraudsters and usually target individuals who are unaware of cyber-security, telecom-fraud and cybercriminals. 

Fraud will happen by stealing PIN, Account Details and sensitive information from the targeted victim.

360_F_452829077_JU5RhSmKQHYSi4mPpMaPIZweDiuIessf

Social Engineering

We all are exposed to social engineering attacks which will trick us into giving our PIN, passwords or bank information and access to our sesetive data.
If you wrongfully share your sensitive information to the wrong person, please report immediately to 994, 127 or send SMS to 9090
Learn More . . .

SIM-LOST

Report your SIM-Card as soon as you lose it as your SIM-Card will be used for fraudulent activity!
If you lose your mobile device/SIM, please immediately report immediately to 994, 127 or send an SMS to 9090.
Learn More . . .

Vishing Call

It is a phone scam in which fraudsters trick you into giving out your sensitive information or into transferring money to them.
* Don’t validate the caller using the phone number they have given you!
* Don’t share your PIN or your banking password!
* Don’t transfer money to another account on their request!

Statistical Facts

0 %
People Are Not Aware of Cyber Criminals
0 %
Cyber Attacks and Frauds are Caused By Social Engineering
0 % +
of frauds can be protected by cyber-security self-awarness
Screenshot 2022-12-20 103855

Be Careful of Your Sensetive Information!

You must not share any personal, financial and credential information with anyone!

Report Immediately!

If you wrongfully share your PIN, Password, Account Details and/or any sensitive information to the wrong person, please report immediately to 994, 127 or send SMS to 9090
Learn More . . .

Report a Fraud Now . . .

The benefits of applying and maintaining cybersecurity practices include:

  • Business protection against cyberattacks and data breaches.
  • Protection for data and networks.
  • Prevention of unauthorized user access.
  • Improved recovery time after a breach.
  • Protection for end users and endpoint devices.
  • Regulatory compliance.
  • Business continuity.
  • Improved confidence in the company’s reputation and trust for developers, partners, customers, stakeholders and employees.

Common Cybersecurity Threats & Attacks

Malware: is a form of malicious software in which any file or program can be used to harm a computer user. This includes worms, viruses, Trojans and spyware.

Phishing: is a form of social engineering where fraudulent email or text messages that resemble those from reputable or known sources are sent. Often random attacks, the intent of these messages is to steal sensitive data, such as credit card or login information

Social engineering: is an attack that relies on human interaction to trick users into breaking security procedures to gain sensitive information that is typically protected.

Frequently Asked Questions

We have all heard that having a strong password is important, but what classifies as a strong password?

Strong passwords:

  • Should be at least 16 characters long
  • Contain and mix letters, symbols, and numbers
  • Avoid utilizing words, especially proper nouns
  • Never include Personally Identifiable Information (PII)
  • Are not re-used

If you are creating secure passwords, it can be difficult to keep track of them all. Using a password management app to store and manage your different passwords can help you keep organized in a secure fashion.

Phishing attacks are a huge part of modern-day cyberattacks – some are highly personalized and may contain references to your coworkers, family members, your hobbies, and more.

The best way to mitigate this is awareness, use the SLAM method to help identify phishing attacks:

  • Sender: Check the sender’s email address
  • Links: Hover and check any links before clicking
  • Attachments: Don’t open attachments from someone you don’t know or attachments that you weren’t expecting
  • Message: Check the content of the message and keep an eye out for bad grammar or misspellings

To help prevent attackers taking advantage of vulnerabilities on your smart devices, update phones, tablets, TVs, speakers, thermostats, etc. with the latest software available. If an Auto-Update feature is available, enable it. These devices can potentially be a source of infection just like any other computer.

To further secure your devices, ensure your utilizing screen unlock password capabilities where available. Organizations should also consider mobile device management solutions to help increase the security of their mobile device environment to help ensure device and app compliance and control data flow outside trusted mobile apps and devices.

  • Report immediately in person or via 994 that you lost your SIM-Card so that you can avoid any illegal activity to be done using your SIM-Card.
  • Dial to 994, 127 or send SMS to 9090 whenever you are suspicious of spam or fraudulent messages.
  • Let us know via all ethio telecom social media platforms.

  • Make sure that your SIM card has a SIM lock.
  • Use strong passwords and keep personal information away from social media.
  • Don’t share your PIN, or password.
  • Do not share your personal information such as your one-time passcode, My Ethiotel or telebirr App accounts with anyone.
  • Do not return a refund for the package mistakenly sent pretending texts/calls whenever you are asked to do so.
  • Do not respond for unknown person who requests airtime or telebirr money transfer.