Detect malicious communications
Most cyberattacks start with phishing.
Protect and update your passwords
To safekeep your information and systems.
Report suspicious communications
That goes for you, your employees, suppliers and customers.
Be discreet: only disclose when necessary
Everybody should know what can be made public and what cannot.
