UZINFOCOM logoUZINFOCOM logo

In the modern digital world, the lack of digital literacy and failure to observe cyber-hygiene when using gadgets and various electronic services pose a serious threat.

The Single Integrator "UZINFOCOM" shares 10 main recommendations on how to thwart Attackers to ensure the safety of your personal data and electronic accounts.

26.11.2025

In the modern digital world, the lack of digital literacy and failure to observe cyber-hygiene when using gadgets and various electronic services pose a serious threat.

1. Ignore spam mailings.
A popular tactic among fraudsters and hackers is called phishing. Through emails or messages, they try to trick recipients into clicking a malicious link or downloading an infected attachment, for the purpose of stealing personal information and demanding a ransom for it.
Most often, such letters may state: "You won", "Fine for an offense", "Fine from MIB", "get a discount", "participate in promotions", while you may read that your time is very limited; this is done so that you act without thinking.
Remember that attackers may leave such letters in the form of an envelope at your place of residence.
What to do in such a situation?
– Do not rush to act and remain calm, and remember that you have enough time to check the reliability of such information through official websites or hotlines before responding to suspicious links or paying fake "Fines" for fictitious offenses through the indicated QR codes.

2. Take care of passwords.
Do not use simple passwords. Complicate them with numbers, various symbols, and capital letters. Do not use the same password on different services. Store login data for applications and websites in a password manager. This is a service that stores all your passwords in one place. To do this, you will not have to memorize a mass of complex combinations for logging in, but only one – to log into such a program.

3. Use "two-factor authentication".
Authentication is the process of confirming that you are who you claim to be. Multi-factor authentication means that you confirm your identity based on not one, but several signs.
On resources, websites, and social networks where it is possible, activate multi-factor (two-factor or "strong") authentication. Thus, even if one factor (for example, a password) becomes known to an attacker, they will not be able to get access to your data.

4. Be careful when making online purchases in online stores (marketplaces).
If possible, use a separate card for shopping, check the authenticity of websites and sellers, make sure the site uses the HTTPS protocol, and the seller has provided full contact details and legal information.
Analyze reviews and beware of prices that are too low, evaluate the situation objectively.

5. Delete unused accounts.
Attackers can "get" them and use them against you, your friends, or even against the company where you work. If you have stopped using any service, then delete or block the account in it.

6. Put everything in order (clean up) the excess.
Unsubscribe from all unnecessary accounts in social networks and messengers. Delete, hide, or limit access to those details about yourself that should not be publicly available.

7. Filter friend lists.
Attackers may resort to various tricks in communication (so-called social engineering). The simplest way is simply not to give them a chance to start communication. Moreover, attackers will not be able to see your personal information, which is available only to those whom you have added as friends. Therefore, pay attention to this and delete from friend lists those whom you do not actually know.

8. Do not share confidential information.
Do not send document data, including passports or, for example, bank cards, via private messages in social networks and messengers. This refers to both text information and photographs or scans.

9. Update applications.
Update applications or programs (antivirus software) not only on the smartphone, but also on the computer. New versions close previous vulnerabilities in them. Developers of the corresponding software monitor this.

10. Know and observe your rights and obligations.
Legislation in the sphere of civil law concerning cybersecurity includes norms regulating relations connected with publicly available information and information systems, as well as questions of liability for violations.

What to do if you have already become a victim of internet fraud or encountered similar situations?
Contact law enforcement agencies. Citizens can apply to law enforcement agencies orally, in writing, or in electronic form.
An oral appeal is submitted through the hotlines of law enforcement agencies:

  • General Prosecutor's Office of the Republic of Uzbekistan - 1007;

  • Ministry of Internal Affairs of the Republic of Uzbekistan - 1102;

  • Ministry of Justice of the Republic of Uzbekistan - 1008;

  • Cybersecurity Center of the Central Bank "CERT-CBU" - (71) 200-00-44.

Be vigilant! Observe cyber-hygiene and do not give in to the attempts of fraudsters to mislead you.