Cybercrime & You

      • Within this page...

        How does cybercrime affect you?

        When you connect to the internet, you may become the victim of cybercrime which may result in:

        • Identity theft: The deliberate use of your identity by another person, usually as a method of gaining financial advantage or other benefits in your name, to your disadvantage or loss.
        • Financial loss: The theft or misuse of your money by an identity thief or cybercriminal. This includes direct loss such as withdrawal of funds from credit cards and bank balances or indirect loss such as legal fees or overdraft charges.
        • Leak of sensitive information: The unauthorized transfer of information from a computer to the outside world. This may include sensitive university information or personal information from your computer such as photos.

        How can you protect yourself?

        • Guard against spam by using spam filters and be cautious of emails that:
          • Come from unrecognized email addresses.
          • Don't have your email address in the To or CC field.
          • Aren't addressed to you (e.g. "Hi customer" versus "Hi John").
          • Ask you to confirm personal or financial information over the internet or make urgent requests for this information.
          • Encourage you to act quickly by threatening you.
          • Include links or attachments that you are not expecting.
        • Avoid the following risky behaviours:
          • Communicating personal information over the internet unless with trusted sources.
          • Clicking links, downloading files or opening attachments in emails from unknown or suspicious email addresses.
          • Conducting banking transactions or providing passwords on websites that are not secure (https = secure, http = not secure).
          • Installing applications on your smartphone or tablet without reading the reviews to ensure the application is safe.
        • Protect your personal devices with:
          • Firewalls on your computers which protect you from unauthorized access to your computers and personal information.
          • Anti-virus and anti-spyware software on your computers which protect you from malicious software that may steal your information or corrupt your software.
          • Regular software and operating system updates which fix known vulnerabilities that cybercriminals try to exploit.
        • Take action if you think you may have been compromised:
          • Immediately disconnect the device from the internet by disconnecting from Wi-Fi or unplugging the network cable.
          • Using another device, change all of your passwords.
          • If the compromised device belongs to Capilano University, contact IT Services to have the device scanned with anti-virus and anti-spyware software.
          • If the compromised device is your own personal device, scan the device with anti-virus and anti-spyware software to ensure the device is secure.

        Where can you find more information?


        If you did not find what you were looking for, contact IT Services.