Cyber security syd

Learn how to be Cyber safe with Cyber Security Syd - think before you click!

Every day, cyber criminals look for ways to trick people into giving away information or access. By staying alert and following a few simple rules, you can help keep the Council, and our data, safe.

Before clicking on a link, opening an attachment, or responding to a message, stop and think. Be extra cautious if a message seems:

  • Too good to be true

  • Urgent or demanding an immediate response

  • From an unusual or unknown sender

  • Written in strange or unexpected language

  • Different from what you’d normally receive from that person or organisation

  • Asking you to “do a favour” or share sensitive details

  • Just making you feel unsure

If you’re in doubt, don’t click, don’t reply, and don’t share information.

Common Cyber Threats Explained

  • Cyber security - phishingPhishing: Fake emails that appear to come from a trusted organisation, asking you to share personal or financial information.
  • Vishing: Similar to phishing, but done by phone call – often starting with a text or voicemail.
  • Smishing: Phishing via SMS (text message). These are often successful because people tend to trust texts more than emails.
  • Clone Phishing: A genuine-looking email copied from a real one but altered to spread malware or steal information. Always check the sender’s address carefully!
  • Spear Phishing: A targeted email from a known or trusted contact, designed to obtain confidential data.
  • Whaling: A sophisticated scam aimed at senior staff or executives, often using information gathered from social media or public sources.

Cyber security - wormMalware

Malware (malicious software) is designed to harm, exploit or secretly access systems. It can spread through infected emails, websites or downloads and may steal or lock your data, spy on users, disrupt systems or spread to other devices.

Common Types of Malware:

  • Virus: Software that replicates itself and damages files or systems.

  • Worm: Spreads quickly through networks without human action.

  • Trojan Horse: Disguised as normal software to steal data or give criminals access.

  • Cyber security - Trojan horseRansomware: Locks your files and demands payment to release them.

  • Spyware: Secretly collects data and sends it to third parties, leading to potential identity theft or fraud.

Report a cyber security concern

If you suspect a cyber security breach, report it straight away via the online form (add link).

And remember, think before you click!