The following is a list of best practices when it comes to protecting against espionage risks at home. As provided by the Dutch Intelligence Service AIVD – or Dutch Secret Service – recognized as one of the best domestic spy agencies in the world.
The AIVD focuses mostly on domestic non-military threats to Dutch national security, including terrorism and espionage directed at civilian and government workers.
“Digital espionage (cyber espionage) is common. Do you doubt the legitimacy of an email? Always check the e-mail message. Is the email address for example not professional, such as: james1234@yahoo.com?Please first contact the sender to verify its authenticity. Prefer not to open attachments from strangers, even though the content is legitimate.”
1) Be careful when opening attachments from emails you receive on a mailing list through a subscription. Attackers sometimes use mailing lists to which you can subscribe. The sender seems regular sender.
2) Be suspicious of emails with attachments that are written in poor English.Especially if this email is coming from a person who should master the English language well.
3) Be suspicious of emails that are of interest to your organization, but not for you personally. It is possible that the attackers only have your e-mail address and do not know what your position is.
4) Distrust an attachment if your computer is doing strange after opening the attachment. For example if an application startup, shutdown, start again and only then open the attachment and displays. This may mean that the attachment is infected.
5) Be careful when leaving your email address on the Internet or at conferences, if you have sensitive information. Also be careful with your name, because that attackers can easily trace your email address.
6) Check USB sticks and other data carriers with a scanner on a standalone PC. Or have it on your desk. Do this especially if you receive a free USB stick or do not know the origin of a USB stick.
7) Do not store sensitive work-related information on your home computer.
8) Be aware of information that you post on the Internet. For example, on your own websites, Hyves, Facebook and the like. The more personal information you put on the Internet, the easier it is to make. Targeted email together.”
Source: AIVD https://www.aivd.nl/onderwerpen-0/spionage-0/herkent-spionage/spionagerisico’-0/