2. Control access

Home » Cyber Self Defence Framework (CSDF) » Cybercrime Prevention Techniques » 2. Control access

2.1 Prioritise protecting access to financial and security monitoring systems


2.2 Use security settings on all platforms

2.3 Use a password manager

2.4 Use MFA everywhere

2.5 Use a hardware token

2.6 Use privacy and security enhancing browser add-ons

2.7 Avoid using social Single Sign On (SSO)

2.8 Encrypt backups

2.9 Apply least privilege to systems and data stores

2.10 Use a low privilege account for day to day activities


2.11 Disable unused accounts

2.12 Delete data from and close unused social media accounts

2.13 Evaluate files before exiting Protected View
Use a webcam cover

2.14 Provide false answers for security questions

Home » Cyber Self Defence Framework (CSDF) » Cybercrime Prevention Techniques » 2. Control access