{"id":24444,"date":"2023-06-01T10:23:57","date_gmt":"2023-06-01T08:23:57","guid":{"rendered":"https:\/\/btc.bw\/?page_id=24444"},"modified":"2024-05-23T09:45:58","modified_gmt":"2024-05-23T07:45:58","slug":"security-center","status":"publish","type":"page","link":"https:\/\/btc.bw\/security-center\/","title":{"rendered":"Security Center"},"content":{"rendered":"
[vc_row][vc_column]\r\n\t
Why Security Matters:<\/strong><\/p>\n In an increasingly interconnected world, where digital communication plays a vital role in our daily lives, security is of paramount importance. Cyber threats are ever-evolving, and staying informed about potential risks is crucial in safeguarding your personal and financial information.<\/p>\n What You’ll Find on Our Security Awareness Page:<\/strong><\/p>\n 1. Security Tips and Best Practices:<\/strong><\/p>\n 2.\u00a0 Latest Threat Updates:<\/strong><\/p>\n [\/vc_column_text]\r\n\t To protect yourself, business and organization against such an attack. Follow the below tips:<\/strong><\/p>\n To protect yourself, business and organization against such an attack. Follow the below tips:<\/strong><\/p>\n To protect yourself, business and organization against such an attack. Follow the below tips:<\/strong><\/p>\n To protect yourself, business and organization against such an attack. Follow the below tips:<\/strong><\/p>\n How to recognize social engineering attempts and what to watch for?<\/strong><\/p>\n Here are tips for safe online payments<\/strong><\/p>\n Tips to browse safely<\/strong><\/p>\n [vc_row][vc_column][vc_column_text]At Botswana Telecommunications Corporation, we are committed to ensuring the security and privacy of your information. As part of our ongoing efforts to promote online safety, we are pleased to introduce our new Security Center Awareness Page. Why Security Matters: In an increasingly interconnected world, where digital communication plays a<\/p>\n","protected":false},"author":7318,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-24444","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/btc.bw\/wp-json\/wp\/v2\/pages\/24444","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/btc.bw\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/btc.bw\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/btc.bw\/wp-json\/wp\/v2\/users\/7318"}],"replies":[{"embeddable":true,"href":"https:\/\/btc.bw\/wp-json\/wp\/v2\/comments?post=24444"}],"version-history":[{"count":0,"href":"https:\/\/btc.bw\/wp-json\/wp\/v2\/pages\/24444\/revisions"}],"wp:attachment":[{"href":"https:\/\/btc.bw\/wp-json\/wp\/v2\/media?parent=24444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}\n
<\/ol>\n
\n
\r\n\t\t\t\r\n\t\t\t\tSecurity Tips\r\n\t\t\t<\/span>\r\n\t\t<\/h3>
\n
<\/figure>\r\n\t\t\t<\/div>[\/vc_tta_section][vc_tta_section title=”PHISHING” tab_id=”Phishing”][vc_column_text]This is a form of fraud where criminals attempt to access your confidential information. This is done either by an email request for information or by leading you to a fake website.[\/vc_column_text]\r\n\t
\r\n\t\t\t\r\n\t\t\t\tSecurity Tips\r\n\t\t\t<\/span>\r\n\t\t<\/h3>
\n
<\/figure>\r\n\t\t\t<\/div>[\/vc_tta_section][vc_tta_section title=”EMAIL SECURITY” tab_id=”Email_Security”][vc_column_text]Email security is the practice of protecting email accounts and communication from unauthorized access loss, or compromise. Cybercriminals targets emails as it an easy entry point to access accounts and devices \u2013 and it relies on human error. All it takes is one misguided click to a link to compromise the whole organization.[\/vc_column_text]\r\n\t
\r\n\t\t\t\r\n\t\t\t\tSecurity Tips\r\n\t\t\t<\/span>\r\n\t\t<\/h3>
\n
\r\n\t\t\t\r\n\t\t\t\tSecurity Tips\r\n\t\t\t<\/span>\r\n\t\t<\/h3>
\n
<\/figure>\r\n\t\t\t<\/div>[\/vc_tta_section][vc_tta_section title=”SOCIAL ENGINEERING” tab_id=”Social_Engineering”][vc_column_text]Social engineering targets human vulnerability. It is all about psychology of persuasion. It takes the mind like con man or grifter. The aim of a social engineering attack is to lower the victims guard and gain their trust thus making them feel safe to disclose personal information or clicking links or dialing USSD codes that might be of malicious intent.[\/vc_column_text]\r\n\t
\r\n\t\t\t\r\n\t\t\t\tSecurity Tips\r\n\t\t\t<\/span>\r\n\t\t<\/h3>
\n
<\/figure>\r\n\t\t\t<\/div>[\/vc_tta_section][vc_tta_section title=”ONLINE PAYMENTS” tab_id=”Online_Payments”][vc_column_text]Online Payments: Safety should be your number one priority when it comes to online payments. With the recent rise of online scams and cyber attacks, keeping your account credentials safe and private is a must.[\/vc_column_text]\r\n\t
\r\n\t\t\t\r\n\t\t\t\tSecurity Tips\r\n\t\t\t<\/span>\r\n\t\t<\/h3>
\n
<\/figure>\r\n\t\t\t<\/div>[\/vc_tta_section][vc_tta_section title=”INTERNET SECURITY” tab_id=”Internet_Security”][vc_column_text]The internet makes life convenient. However, with the vast growing technology, cyber criminals are also creating sophisticated and new ways to manipulate users into granting them access and disclosing personal information.[\/vc_column_text]\r\n\t
\r\n\t\t\t\r\n\t\t\t\tSecurity Tips\r\n\t\t\t<\/span>\r\n\t\t<\/h3>
\n
<\/figure>\r\n\t\t\t<\/div>[\/vc_tta_section][\/vc_tta_tour][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"