- use licensed software and avoid unauthorized copies;
- make sure your operating system is updated;
- use a browser that can be updated and make sure that the updates are installed as soon as they become available;
- if you use plug-ins for your browser, make sure they are trustworthy;
- use daily updated antivirus protection. Many antivirus software producers offer free copies of their software. Scan your system regularly in order to identify any potentially malicious files;
- set up your operating system to display file extensions, so as to be able to see their true extension. Those who disseminate malicious applications often change their extension in order to persuade users to run executable files;
- access trusted websites. There is a number of browser plug-ins that provide a safety rating of accessed sites;
- do not access the links sent by e-mails requesting updates of personal data; legitimate entities will not require you to supply or check sensitive information by unsecured means, such as e-mail;
- do not open e-mail attachments from unknown senders;
- links are not always what they seem to be. In order to see the real URL hiding behind the link, keep the mouse pointer on the link and you will see the real link on the bottom left-hand side of the window;
- do not run programs whose origin cannot be checked;
- always be skeptical when receiving a very tempting offer. Many phishing techniques try to trick you into providing personal data;
- the first rule of surfing the Internet is to stay anonymous. Therefore, do not provide your personal data (your full name, address, phone number, PIN, passwords, names of family members, credit card numbers). Most trustworthy individuals and companies will not ask you to provide such data over the Internet.
- think carefully before you create an e-mail address or username. Web experts recommend the use of a combination of letters and numbers; avoid any details that could indicate gender;
- when you join online communities, such as Facebook, Twitter, etc. be as discreet as possible. The personal data and photos posted on the virtual environment could be used against you. Anyone can access your profile on social networks in order to gather information that could be later on used to cause you problems;
- make sure that Facebook applications you accept are trustworthy;
- avoid as much as possible risky searches, because their results could contain links to websites hosting malicious content. These websites can install spyware – type malicious applications, viruses etc. If you use file-sharing applications, it is very likely to download a virus instead of the audio or video file you want;
- be aware of the clues indicating the website’s security measures. Secure websites use https:// for web addresses, the letter “s” indicating the fact that the respective website uses encryption to protect data transfers. Never provide personal data to a website whose address is preceded by „http://”;
- avoid the use of public wi fi hotspots for carrying out banking operations, online commerce or personal business;
- deactivate your Bluetooth when you are not using it.
In case you suspect a potential terrorist risk, please call the antiterrorist hotline: 0800.800.100 (tax-free calls).
For safety reasons, the caller’s identity is protected.
When to call? When you notice the following situations or individuals that may generate terrorist risks:
- individuals interested in obtaining substances that could be used for terrorist purposes(explosives or their precursors, poisonous substances etc.);
- actions aimed at disturbing the functioning of important institutions / locations (high importance strategic objectives);
- individuals who illegally manufacture, possess, transport or handle weapons, ammunition or substances that could be used for terrorist purposes;
- repeated or prolonged presence of unauthorized persons in the proximity of foreign diplomatic missions, the headquarters of international institutions etc.;
- the inexplicable interest of certain individuals in studying or obtaining data regarding such locations;
- persons who film or take photos of objectives where this is forbidden;
- a vehicle stationing for a long time and without a reason in the proximity of very important sites, diplomatic missions and / or other crowded places;
- people carefully watching crowded places (train or metro stations, airports, large commercial centers, tourist, sports, or cultural sites);
- if, without apparent reason, someone asks you or other people questions about the working hours of certain institutions, rush hours, the change of guard at embassies etc.
If your activity requires handling classified information and/or if you regularly travel abroad you may stir up the interest of foreign intelligence services.
Here are some indications of foreign secret services’ potential interest in your person:
- certain people or institutions show undue interest in getting classified information related to your field of activity (political, military, economic, social, administrative)
- certain people or institutions show undue interest in you, your professional activity, the source and quantum of your income, your family members, friends, etc.
- you are asked information about people handling classified data
- people you get in touch with are using listening/ tapping devices – either covert or in plain sight
- potential cyber attacks (for instance actions taken by certain intelligence services, individuals or private entities that, via internet, making use of social engineering techniques and/or malicious codes, try to illegally access the information systems of relevant institutions or authorities managing classified documents in order to extract information of interest or disrupt the activity of their targets).
HOW to respond to a potential PHONE-IN BOMB THREAT in your workplace.
- keep in mind the exact wording of the threat;
- try to get additional data if the caller does not indicate the bomb location or the moment of its detonation;
- inform the caller that there are many innocent people in the building that could be seriously wounded or even killed in the blast;
- give particular attention to the background noise (specific to open/ closed space) that could give you a hint about the location of the person who is making the phone call;
- listen carefully to the type of voice (male, female), its tone (calm, nervous), eventually the accent and speech problems.
After the call:
- notify managers immediately, respectively the person in charge with dealing with such situations;
- call the single emergency number “112” and deliver the message you have just received;
- remain available to inquiry authorities coming to the scene to provide them with the necessary details to settle the situation
HOW to react if you receive a BOMB THREAT VIA WRITTEN NOTE in your workplace
- keep intact all items (envelopes, storage devices, e-mails, etc.) to prevent, thus, tampering with the evidence essential in identifying the threat and author.
After receiving the threat:
- notify managers immediately, respectively the person in charge with managing such situations in your institution;
- call single emergency number “112” and send data about the existing threat;
- be available for interviews with investigators who will come to the scene, to provide them with details necessary to resolve the situation.
HOW to react if you find a SUSPICIOUS PACKAGE at your workplace
Notify managers immediately, respectively the person in charge with managing such situations in your institution.
General self-protection rules:
- do not touch the item/ package as long as it seems suspicious (some explosive devices are built to explode at any movement);
- do not cut any ties and do not take down any tags, seals, etc. (rope or cable that could be attached to an explosive mechanism, may cause the blast);
- remove all combustible materials from the vicinity of the package to prevent a fire, but without coming closer to the suspicious item/ package;
- do not use heat sources in the vicinity of the packages as they could cause the volatilization and expansion of the toxic substances inside them;
- avoid radio frequency transmissions near the suspicious item, as it may cause explosion;
- authorized person/ structure in your organization implements the evacuation plan in case of emergency;
- authorized person calls single emergency number “112” and sends data about the existing threat;
- prior to the arrival of authorities, the authorized person/ structure in your organization undertakes the necessary measures to ensure the safety/ surveillance of the respective package and prevent any person from coming closer to it, thus preventing an accidental initiation of the bomb or avoiding casualties caused by an explosion;
- at the arrival of authorities who will neutralize the item/ package, the authorized person/ structure in your institution will brief them in detail.
HOW to react in case of a TERRORIST BOMB ATTACK
Do not panic! Try to remain calm and stand still!
Assess the current situation:
- Do you have shrapnel wounds? (You may not feel the pain immediately, due to emotional distress caused by the explosion.)
- If you are wounded, stop the bleeding by using clothing!
- Are there building elements at risk of collapse or partially collapsed in your current location?
- Do not hide, do not remain in such places!
- Find the safest exit!
- Avoid narrow passages towards exit in order not to cause stampede or accidents!
- Is there any sign of fire, smoke or heavy dust in your location or surroundings, do you smell gas or flammable substances?
- Do not hide, do not remain in such places!
- Protect your breathing airways by using clothing!
- Keep away from plumbing and electrical wiring systems at the explosion site or surroundings!
If qualified, give first aid to injured people!
Keep away from objects partially destroyed in the explosion or debris scattered around!
Listen carefully to and follow law enforcement directions!
Tell law enforcement officers what you noticed as witness of the explosion or the aftermath!
HOW to react in case of an ARMED TERRORIST ATTACK
Leave the attack scene!
- If you can find a safe route out, take only your ID papers and cell phone, no other belongings!
- If wounded, stop the bleeding!
- Do not panic! Call 112 and give details about:
- location - details about the area and the building!
- number of attackers, details about their physical description and weaponry!
- victims or hostages!
- Prevent others from reaching the attack scene!
- Listen carefully to and follow law enforcement directions!
- Tell law enforcement what you noticed while at the attack scene!
- If you cannot run, hide!
- If wounded, stop the bleeding!
- Stay away from windows, glass doors, wood or metal surfaces! It is safer to stay behind a wall!
- Silence your phone – no sound or vibration!
- Dial 112; speak quietly to avoid alerting the attacker! Send short messages about the attack location!
- Do not make any noise or movement that could alert the attacker!
- Block access to your location!
- If qualified, give first aid to injured people!