Closed Thread
Results 1 to 10 of 10

  Click here to go to the first Trove Team post in this thread.   Thread: Guide - Cyber Safety

  1.   Click here to go to the next Trove Team post in this thread.   #1

  2.   Click here to go to the next Trove Team post in this thread.   #2
    Community Manager Elariok's Avatar
    Join Date
    Apr 2020
    Posts
    250
    1.1) A strong password

    • Is one that is more secure by virtue of being difficult for a machine or a human to guess. Password strength can be achieved by incorporating the following characteristics: the more characteristics you incorporate into your password, the stronger it will be.
    • At least 8 characters—the more characters, the better
    • A mixture of both uppercase and lowercase letters
    • A mixture of letters and numbers
    • Inclusion of at least one special character, e.g., ! @ # ? ]
    A strong password is hard to guess, but it should be easy for you to remember—a password that must be written down is not strong, no matter how many of the above characteristics are employed.

    Example: Think of a random sentence, like ‘Amaliena and Elariok are 2 really cool CMs!’ and then simply take the first letters of that sentence as your password like this: AaEa2rcCM! And here you have an easy for you to remember password, which others would have a hard time guessing.


    1.2) Weak passwords

    • Any word that can be found in a dictionary, in any language (e.g., airplane or aeroplano).
    • A dictionary word with some letters simply replaced by numbers (e.g., a1rplan3 or aer0plan0).
    • A repeated character or a series of characters (e.g., AAAAA or 12345).
    • A keyboard series of characters (e.g., qwerty or poiuy).
    • Personal information (e.g., birthdays, names of pets or friends, Social Security number, addresses).
    • Anything that’s written down and stored somewhere near your computer.


    1.3) Keeping your passwords secure:

    • Change it regularly—once every three to six months.
    • Change it if you have the slightest suspicion that the password has become known by a human or a machine.
    • Never use it for other websites.
    • Avoid typing it on computers that you do not trust; for example, in an Internet café.
    • Never save it for a web form on a computer that you do not control or that is used by more than one person.
    • Never tell it to anyone.
    • Never write it down.

  3.   Click here to go to the next Trove Team post in this thread.   #3
    Community Manager Elariok's Avatar
    Join Date
    Apr 2020
    Posts
    250
    2) Account Name Safety

    • Don't just use your name as a username.
    • Avoid using the beginning of your email address as your username.
    • Your username should be simple enough to remember but hard to guess.
    • Never use easy-to-guess numbers with your usernames (for example, address or date of birth).
    • Don't use your Social Security number or ID number as your username.
    • Do not divulge your location. It is wise to choose a screen name that does not give away where you live, such as "Denver Chick Lucy", or "Madison Avenue". Also avoid usernames that would reveal your zip code, such as "Logan21508". Don't even give away your state, city or country.
    • If you're struggling, try an online username generator.
    • Consider a screen name's effect on others (make sure it's readable and inoffensive).
    • Keep it clean (avoid bad words or anything sexy, which can attract the wrong kind of attention).

  4.   Click here to go to the next Trove Team post in this thread.   #4
    Community Manager Elariok's Avatar
    Join Date
    Apr 2020
    Posts
    250
    3.1) What can people do with private/personal information?

    Personal information is everything about yourself. It can include:

    • Your full name.
    • Your address.
    • Your social security number.
    • Your phone number.
    • Your age or date of birth.
    • Your children or other family members.

    • Why is it so critical that you hide your personal information? It’s because personal information is often traded online because there are a lot of things that can be done with it.
    • Your identity can be stolen. People can use your personal information to open credit or loan accounts on your behalf, which can be incredibly dangerous for your credit score and financial future.
    • You can be impersonated. Scammers may start accounts that look like you so they can impersonate you to friends and family. From there, they can scam money on your behalf, and it can take a long time to sort out what happened.
    • You can be found. Sometimes, it’s more a personal danger. People can find you online when you put personal information out there. It’s possible that a dangerous person from your past could find you, or just someone with a vendetta.
    • Personal information equates to risk. The more your personal information is out there, the more dangerous it is for you. But it’s very hard to limit your personal information because it’s so ubiquitous.

  5.   Click here to go to the next Trove Team post in this thread.   #5
    Community Manager Elariok's Avatar
    Join Date
    Apr 2020
    Posts
    250
    3.2) How to keep information private

    It’s possible to keep information private. Here’s how:

    • Using an alias online. Instead of using your real name, you can always use a different name. This reduces the chances that your online presence will be connected to you. You can also use slight variations on your real information, such as a different age, or a different location.
    • Avoid sharing things you want to keep private. Things like photos and videos, once on the internet, will be spread. Don’t post anything that you’re afraid could be seen by someone else and remember that everything on the internet is permanent.

    Note: For most people, it’s highly unlikely to completely keep your personal information off the internet. The best thing that you can do is to make sure to limit and mitigate your risks, and to understand why keeping information private is so important. Most people are going to slip up and post something personal online at one point or another, whether they’re responding to a friend in a social media comment, or they’re uploading their data to a medical clinic that is later compromised.
    Since information cannot be eradicated from the internet, it can only be distanced from. Individuals need to be constantly curating their online identity and protecting it, through habits such as using aliases. It’s equally important to avoid disclosing information to people online through email, messages, online groups, and video games because anything that is posted online in private can eventually become public.

  6.   Click here to go to the next Trove Team post in this thread.   #6
    Community Manager Elariok's Avatar
    Join Date
    Apr 2020
    Posts
    250
    4) Real-Money Trading (RMT)

    We understand that there are a lot of businesses out there that claim to help gamers by selling them services that are desired by gamers, but not offered by the company providing the service. The purchasing of currency, game accounts, or in-game items might seem like it hurts nobody while giving you a little more enjoyment in your game.

    The truth about real-money trading (RMT) operations is often less innocent and is against our Terms of Service and therefore NOT allowed:

    • In-game currency for sale most often comes from stolen accounts and other internet fraud, such as stolen credit cards.
    • An account purchased from another person can never really be yours and offering/purchasing an account is against the ToS.

    If you want to spend money to enjoy the game more, please spend it on the official game store. It pays for improvements to the game and will allow you to continue safely enjoy the game. If there is a particular service you desire that is not provided, ask for it on our forum, You might find out that other people would like that service too!

  7.   Click here to go to the next Trove Team post in this thread.   #7
    Community Manager Elariok's Avatar
    Join Date
    Apr 2020
    Posts
    250
    5.1) What is phishing?

    • Phishing is one of the social engineering techniques used by hackers to make victims do something, get sensitive information, install malware or exploit vulnerability preferably via email but also via other services like instant messaging systems or social networks. Statistics say that phishing is used in more than 90% cases to deliver malware.
    • Companies and individuals are often targeted by cybercriminals via emails designed to look like they came from a legitimate bank, government agency, or organization.

    5.2) How to recognize phishing

    Bad grammar

    • Possibly the easiest way to recognize a scammy email is bad grammar. An email from a legitimate organization should be well written.
    An example of an attempted scam, including bad grammar:

  8.   Click here to go to the next Trove Team post in this thread.   #8
    Community Manager Elariok's Avatar
    Join Date
    Apr 2020
    Posts
    250
    5.2) How to recognize phishing

    Email Date

    • Official business email sent after midnight or during the weekend looks weird.

    Email Subject

    • Usually hackers try to make you believe that the email contains some important information and ,moreover, try to put you in a situation where you should take some action immediately. They will try to get your attention with a title which calls to your attention, and which indicates to be important.

    Links

    • Links can be used to download malware - instead of attaching malicious files to the email itself and to avoid defense mechanisms from your computer (which might scan your email attachments). Links are also used to redirect you to fake-sites or somewhere, where they possibly compromise the web browser that you are using by an exploit. In addition, you might be prompted to download applications, documents, zip files, or even executables, depending on the pretext of the email.

    Do not click any links!

    Attachments

    In this scenario, cybercriminals attach a malware file to the phishing email and rely upon you to download/open it. There are many different types of attachments, such as Microsoft Office documents, executables, PDFs, or archived files. Upon opening the attachment, the cybercriminal exploits a vulnerability or directly gains access to your system.

    Do not click/download any attachments!

    Example of a phishing-attachment:

  9.   Click here to go to the next Trove Team post in this thread.   #9
    Community Manager Elariok's Avatar
    Join Date
    Apr 2020
    Posts
    250
    6) Anti-Virus Software

    What is a computer virus?

    • A computer virus, sometimes called malware, is a computer program that is installed on your computer without your knowledge that is intended to perform tasks that are not in your best interests.

    What does anti-virus software do?

    • Anti-virus software examines every file and piece of software that tries to install or execute on your computer and determines if it’s malicious.

    What should you install?

    • We’re not going to recommend a specific piece of software, but here are some guidelines.
    • Software you pay for is generally better than freeware. Often it will include behavioral detections and additional features such as blocking you from visiting known malicious websites. Usually, they cost less than $100 per year, and often the fee allows you to protect several computers.
    • Well-known software from reputable vendors is usually better than something no one has ever heard of. Check magazines / online magazines or something similar for ratings and reviews.

  10.   This is the last Trove Team post in this thread.   #10
    Community Manager Elariok's Avatar
    Join Date
    Apr 2020
    Posts
    250
    How can you recognize a gamigo / Trove team member?

    • All current CMs and Volunteers can be reviewed at any time on the forums >>HERE < • Real gamigo team members will never add you to any friends list.
    • Real gamigo team members can be found on your game’s official Discord server.
    -> You can check the Discord-Tag by right-clicking on the team member's name in the official Trove discord and see if it matches the one contacting you:


    • Real gamigo team members will never ask for your password or email address on the account/personal information (Customer support might ask these things to verify information and to identify you as the owner of the account).
    • If someone ever adds you to any friends list and claims to be an official gamigo team member and requests your information, please take a screenshot of the chat and report it immediately via ticketing system >>HERE <<.

Closed Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts