Loading article

Your Security

Social Networks, be careful of what you share!

Social networks have become our photo albums, our bulletin boards, even our voice. We publish what happens to us during the day, we give our opinion on news, we participate in debates... And all this, very often, publicly.

Twitter, Facebook, Instagram, Snapchat, LinkedIn and many other social networks work as a showcase of the lives of millions of people. However, although we love to share our experiences with our contacts, we must take into account that if we do without taking a series of precautions, all the information we publish may end up being accessible to other users of the social network, who could make an X-ray of our lives if they wanted to. This is a tactic widely used by cybercriminals. They use our publications to get information, impersonate identities, steal credentials or even blackmail us asking for something in exchange for not distributing an image or publication.

If you want to know how to avoid being a victim more, use social networks safely. Here's how:

Follow our advice and use them safely:

Protect them with strong passwords and do not share them with anyone.

Accept requests from acquaintances only.

Set up privacy and decide who can see your posts.

Do not share personal information with just anyone.

Avoid publications that could damage your reputation.

Be suspicious of publications with ads, sweepstakes and irresistible offers.

Beware of messages that contain links.

Security on every click when browsing the Internet

In life you an identity that defines you and differentiates you from others according to your name, traits, personal characteristics, acts... On the Internet you also have what is known as "digital identity".

With just one click, we can search information on a website, publish on social networks, check our email, buy or even do banking.

This facility to access the Internet and everything we need simplifies our day to day, but... Are we aware of the dangers after each click?

Just as in real life there are criminals, on the Internet, cybercriminals exploit every neglect, both human and technical, to steal information, propagate viruses or take any action they can use for their own benefit.

However, safe surfing is possible. How? Take a look at the following infographics and video.

Some threats that may hide behind clicks

Malicious pages.

Pages that lead to fraudulent sites.

Files with viruses.

Avoid falling into them and move on the Internet safely

When providing sensitive information (passwords, bank data…) on the web, check that the browser bar shows HTTPS or a green lock.

Disable the “remember passwords” option and close your sessions on exit.

Occasionally delete browsing history, cookies and temporary files.

Pay attention to links and attachments before clicking on them.

Keep your computers up-to-date (operating system, browsers and applications) and install, whenever possible, an antivirus.

Phishing: A click makes a difference

Phishing attacks are increasingly sophisticated and convincing. They confuse users to compromise their own security. These cybercriminals use many excuses to capture our attention and redirect us to fraudulent websites that pretend to be legitimate: urgent updates, packages that you have not requested but need to collect as soon as possible, notices of a last payment, the bank asking you to change your password and so on...

How do they do it?







How do I know if it's really ScottishPower?

where it comes from

Where is it coming from?

Make sure the email comes from @scottishpower.com or @scottishpower-online.co.uk


What is the tone?

Pay attention to the tone of the content. Be suspicious if it requires urgent action or sounds too good to be true

ScottishPower link

Is the link ScottishPower?

Before clicking on a link and giving any data, check that the link goes to @scottishpower.co.uk or @campaign.scottishpower-online.co.uk

What if I receive suspicious calls

Don’t be alarmed but be vigilant. Help protect yourself from fraud by following these simple steps:

  • Never disclose your bank or credit card pin numbers or online / telephone banking passwords and security information.
  • If a caller states they are from your bank and mentions an unusual transaction, be very cautious about providing any details and take steps to confirm the caller’s identity.
  • If you receive any suspicious calls saying they are from a trusted service provider, hang up and check with your service provider.
  • If you have concerns about the security of your financial or personal details, you should contact your bank as a precaution so they can provide appropriate advice.
  • Contact www.actionfraud.police.uk to report it

We understand the importance of keeping your personal details safe. To find out more visit www.getsafeonline.org


It quickly installs in your system and locks your files. The only way to get them back is by paying a ransom... Do you know what we are talking about?

Ransomware is a type of virus that can encrypt (lock) all of the information on your mobile or desktop devices. To get access to your information, the Ransomware software will demand a payment from you in exchange for a key to decrypt the information.

Ransomware may reach you through:

Emails containing infected attached files

Fraudulent links

Malicious websites

How to protect yourself from ransomware

Verify the sender

If you receive an email with a link or file attached, verify that you recognise the senders email address, and that any links are redirecting you to an authentic website.

Create backups

Make periodic backup copies of your important information, and save them elsewhere.

Use an antivirus

Have an antivirus application installed with the latest updates on your devices.

Update devices

Keep your devices up to date with the latest operating system and security updates.

What do you do in the event of a ransomware attack?

Never pay the ransom

Contact www.actionfraud.police.uk to report it


The keys to your digital identity

You access services that require a password on a daily basis, including social networks, online banking, email, online stores, etc. This is why we say your passwords constitute the keys to your digital identity.

In the same way you look after your house keys, your passwords must also be protected, because if someone gains access to them, they might use them for identity theft or to carry out operations in your name, seriously compromising your privacy.

How to manage your passwords in a more secure manner

Have a look at the following tips and discover how to correctly manage your passwords:

Create robust passwords:

Containing more than 8 characters, using capital and lower case letters, symbols and numbers.

Use different passwords:

For each of your services (email, social networks, banking...).

Keep passwords personal:

Your passwords are personal and non-transferable. Do not share them with anyone.


Change them:

You should update your passwords periodically

Use a password manager:

If you have several passwords and these are hard to remember, use a password manager. These allow you to store them in a safe manner under a single key


Two-step verification:

Always opt for two-step verification.

The mobile, a lifetime in your pocket

The mobile, that device that goes with us wherever we go has become a necessary element for our day to day. Not only can we call, "WhatsApp" or surf the Internet with it, we have all our contacts, photos, personal mail, and apps ... saved in it. Practically, everything we may need in our day to day is concentrated in this small device.

Have you ever wondered what would happen if, suddenly, it were affected by a virus and stopped working? What if you lost it or it were you stolen? What would happen is that not only would you physically lose your device, but you would not have access to all the information contained therein either... With all the headaches this entails!

Of course, we cannot prevent, situations such as those mentioned above from happening, but what we can do is take a series of precautions so that, in case this happens, our information will not be affected at any time.

If you want to know how to act, follow our advice and protect your mobile.


Your mobile contains valuable information. If it is lost, stolen or infected by any virus type, part of your life (contacts, photos or even bank details) could be affected.

Do not risk it, protect it:

Keep the operating system and installed applications up-to-date.

Download applications only from official sites and verify that the permissions they request are those necessary for their operation.

Periodically make back-ups of the most important information.

If your mobile allows it, install an antivirus and keep it updated.

Turn off Wi-Fi and Bluetooth when not in use.

Do not lose sight of it and protect it with a pin or unlock pattern.

Install an application that allows you to locate the mobile and delete its contents remotely in case of loss and theft.

Digital Identity, protect who you are

Just as in your life you have an identity that defines you and differentiates you from others according to your name, traits, personal characteristics, acts... On the Internet you also have what is known as "digital identity".

The digital identity is the virtual image that is created of your person based on what you share on the Internet (likes, personal data, opinions...), but also what others share about you (photos tagged, comments...).

Have you ever tried to find your name on the Internet? Photos, professional profiles, sports test results... These are just a few examples of information that anyone can know about you with just a simple search.

What if someone uses that information against you? In the event that someone, with not very good intentions, accessed that information, they could use it against you by making negative publications about you or even supplanting your identity in the worst case scenario.

To prevent this from happening make sure you decide what you want to share with others, here are some tips to help you take care of your digital identity.

How is your digital identity built?

With the information you upload to the internet..

With information that others upload about you.

If you do not take care of it, it may be that...

Your image is damaged by negative comments about you.

Someone impersonates your identity (by publishing or performing actions in your name).

So, how to protect it?

Protect your accounts with strong passwords and use different passwords for each one.

Periodically, look for your name on the internet and check what information there is about you.

What you publish says a lot about you. Be careful with the information you share.

Watch out for public Wi-Fi's Avoid accessing services that require personal information if you are not sure that you are on a secure network.

Check the privacy settings of your social networks. and decide who can see your posts, tag you...