Skip to main content

10 tips for protecting your most important data

From: Techgig.com

For many modern businesses, their data is their most valuable asset. However, these days it seems every morning brings news of another high profile data breach.

Sadly hackers are becoming more sophisticated and more determined than ever before, but this doesn’t mean businesses can’t take steps to protect themselves. Just a few considerations regarding security processes can be enough to ensure would-be hackers move on to an easier target.

Here are ten tips which can help individuals and businesses of all shapes and sizes better protect personal data, financial information and privacy.

Keep your operating system and all software up to date.

This is a tip you’ll hear time and time again from security professionals. Those pesky OS and computer software updates are not only important from a functionality standpoint, but they more often than not contain critical security updates and vulnerability patches.

Where possible, enable automatic software updates to streamline the process and ensure you are always up to date.

Encrypt sensitive data.

Data encryption is no longer just for large enterprises – there are many tools now available to individuals and smaller businesses (some free) that make it easy to encrypt your sensitive data.By using

By using encryption, you can ensure that your data will remain unreadable and safe, even if accessed by a malicious actor. Additionally, always encrypt sensitive data before copying to removable devices such as USB storage or portable hard drives.

In doing so, you’ll ensure that your sensitive information isn’t at risk if a device is lost or stolen.

Use antivirus software.

While it’s widely accepted that antivirus software won’t protect against all types of threats, it does still offer baseline protection against common, well-known malware.

At the minimum, install a reputable free antivirus tool and perform virus scans periodically on all of your IT.

Ensure all employees use a unique, complex password for every account.

Reusing passwords (or slightly modified passwords) across different accounts is one of the biggest concerns in the event of a hacking attack or data breach.

Many times attackers will attempt to access multiple other accounts (banking, PayPal, etc) using login credentials that they have obtained for a single, original account.

If employees reuse passwords, a simple credential breach of a non-sensitive account can grant attackers access to an organisations most sensitive online accounts quickly and easily.

Securely archive or delete data no longer needed.

Minimising the amount of data an organisation stores is not only good housekeeping, but it also minimises the amount of information that is available to an attacker that has gained access to those devices.

If data is no longer needed, it should be encrypted and moved to an offline storage device or deleted altogether – particularly old bank statements, contracts, bills, health records, and work documents.

Regularly monitor activity on online accounts.

No surprise here – the best way to stay on top of a compromised account or fraud is to monitor account activity regularly.

If suspicious activity is identified, all parties involved should be notified immediately. Even with other protections in place, vigilant monitoring is still often the fastest way to identify a compromise.

Change all passwords following news of an account compromise or data breach.

Sadly, data breaches make the news all the time these days – but what should be done when a company or website with which you have an account gets breached?

The most important first step is to change all associated passwords. By doing so, you ensure that your credentials are useless, even if stolen.

Manage privacy settings for mobile applications and online accounts.

While it may seem like a daunting task in today’s day and age, keeping up with the privacy settings for different accounts and applications is critical.

It’s still the best way to ensure that companies (or individuals) do not have access to private information about yourself or your business.

Be wary of free Wi-Fi networks.

Hackers and online thieves often use unprotected Wi-Fi networks to carry out sniffing and/or man-in-the-middle attacks on unsuspecting victims, stealing credentials or other data in-transit.

Avoid using free Wi-Fi networks, particularly in high traffic public places like cafes, airports, and similar places. If using an unprotected Wi-Fi network is unavoidable, be sure that HTTPS is enabled for any sites visited – a good habit for all online activity.

Learn to recognise and avoid phishing attacks (and educate your employees).

Social engineering tactics, particularly phishing attacks, are an incredibly popular tactic for cyber criminals.

Why is that? Simply put, it’s often faster and easier for an attacker to trick another person into taking a desired action rather than conducting complex, manual hacking attacks themselves. Phishing attacks typically have telltale signs such as unfamiliar senders, strange domain names, spoofed web pages or emails, and messages with links or attachments that weren’t requested.

Leverage free online resources to train yourself and your employees to better identify phishing attacks, and avoid messages that appear suspect.

Sadly cyber attacks and online fraud are becoming an increasingly prominent part of personal and business environments today, but there is still plenty that can be done to reduce the odds of an unwelcome attack.

By following these tips and training employees to do the same, individuals and businesses alike can ensure they are not an easy target.

Comments

Popular posts from this blog

This Was The Thing That Made Steve Jobs So Great

Reference: TechGig.com John Sculley It's been nearly 4.5 years since Apple cofounder Steve Jobs passed away. But he remains a role model for many today - the gold standard of a tech visionary. One of the few men who could call himself Steve Jobs' boss, former Apple CEO John Sculley, talks about why in his new book, "Moonshot." "Steve was not an engineer - he just saw different things that people were working on and connected the dots between them," Sculley wrote in his new book, notes the New York Post. Sculley gave the example of how Jobs added calligraphy fonts to the Mac, which created a new market for the Mac as a way to do home-grown document publishing. "That was something no one was working on at the time," Sculley said. Obviously, it's not that easy to look at the world, see what's missing and deliver a high-quality product that fits the bill. Otherwise, we'd all be Steve Jobs. John Sculley/Michael Seto/Busines...

Do you require a dedicated system administrator?

Technology has evolved so has administrator. Days have gone when people were needed to sit in front of System to monitor or manage it. With growing orchestrations tools and system remote manage capabilities. We really don’t require someone to be deputed to do administration on site. We require people to manage the floors and handle physical issues rather than management issues. Outsourcing Administration and Management of Server assets not only give organization peace of mind but quality Engineers to take care of their infrastructure with excellence. Day has come to take a step ahead and take on board organization as System Administrators rather than Resource with limited knowledge.

Microsoft Ends Support for Windows 10 Version 1803, Users Advised to Update Now to Get New Features

Microsoft has announced that the company will no provide updates to PCs running Windows 10 version 1809 (aka October 2018 Update) as it will no longer support the outdated operating system. Originally, support for the Windows 10 version 1809 was supposed to end early this year; however, it was delayed to the COVID-19 pandemic, therefore giving more time to users and IT professional to update their systems. As a result, users with Windows 10 Home or Pro editions of Windows 10 version 1809 will not receive monthly security and quality updates containing protections from the latest security threats. To update to latest Windows OS, users can head to Settings > Update & Security > Windows Update. Although several users are likely using the Windows 10 version 1909 as Microsoft started rolling out the automatic update last December, the newer version might be unavailable to those who turned off automatic updates. Typically, Microsoft brings new features for Windows 10 versions fo...