Skip to main content

10 tips for protecting your most important data

From: Techgig.com

For many modern businesses, their data is their most valuable asset. However, these days it seems every morning brings news of another high profile data breach.

Sadly hackers are becoming more sophisticated and more determined than ever before, but this doesn’t mean businesses can’t take steps to protect themselves. Just a few considerations regarding security processes can be enough to ensure would-be hackers move on to an easier target.

Here are ten tips which can help individuals and businesses of all shapes and sizes better protect personal data, financial information and privacy.

Keep your operating system and all software up to date.

This is a tip you’ll hear time and time again from security professionals. Those pesky OS and computer software updates are not only important from a functionality standpoint, but they more often than not contain critical security updates and vulnerability patches.

Where possible, enable automatic software updates to streamline the process and ensure you are always up to date.

Encrypt sensitive data.

Data encryption is no longer just for large enterprises – there are many tools now available to individuals and smaller businesses (some free) that make it easy to encrypt your sensitive data.By using

By using encryption, you can ensure that your data will remain unreadable and safe, even if accessed by a malicious actor. Additionally, always encrypt sensitive data before copying to removable devices such as USB storage or portable hard drives.

In doing so, you’ll ensure that your sensitive information isn’t at risk if a device is lost or stolen.

Use antivirus software.

While it’s widely accepted that antivirus software won’t protect against all types of threats, it does still offer baseline protection against common, well-known malware.

At the minimum, install a reputable free antivirus tool and perform virus scans periodically on all of your IT.

Ensure all employees use a unique, complex password for every account.

Reusing passwords (or slightly modified passwords) across different accounts is one of the biggest concerns in the event of a hacking attack or data breach.

Many times attackers will attempt to access multiple other accounts (banking, PayPal, etc) using login credentials that they have obtained for a single, original account.

If employees reuse passwords, a simple credential breach of a non-sensitive account can grant attackers access to an organisations most sensitive online accounts quickly and easily.

Securely archive or delete data no longer needed.

Minimising the amount of data an organisation stores is not only good housekeeping, but it also minimises the amount of information that is available to an attacker that has gained access to those devices.

If data is no longer needed, it should be encrypted and moved to an offline storage device or deleted altogether – particularly old bank statements, contracts, bills, health records, and work documents.

Regularly monitor activity on online accounts.

No surprise here – the best way to stay on top of a compromised account or fraud is to monitor account activity regularly.

If suspicious activity is identified, all parties involved should be notified immediately. Even with other protections in place, vigilant monitoring is still often the fastest way to identify a compromise.

Change all passwords following news of an account compromise or data breach.

Sadly, data breaches make the news all the time these days – but what should be done when a company or website with which you have an account gets breached?

The most important first step is to change all associated passwords. By doing so, you ensure that your credentials are useless, even if stolen.

Manage privacy settings for mobile applications and online accounts.

While it may seem like a daunting task in today’s day and age, keeping up with the privacy settings for different accounts and applications is critical.

It’s still the best way to ensure that companies (or individuals) do not have access to private information about yourself or your business.

Be wary of free Wi-Fi networks.

Hackers and online thieves often use unprotected Wi-Fi networks to carry out sniffing and/or man-in-the-middle attacks on unsuspecting victims, stealing credentials or other data in-transit.

Avoid using free Wi-Fi networks, particularly in high traffic public places like cafes, airports, and similar places. If using an unprotected Wi-Fi network is unavoidable, be sure that HTTPS is enabled for any sites visited – a good habit for all online activity.

Learn to recognise and avoid phishing attacks (and educate your employees).

Social engineering tactics, particularly phishing attacks, are an incredibly popular tactic for cyber criminals.

Why is that? Simply put, it’s often faster and easier for an attacker to trick another person into taking a desired action rather than conducting complex, manual hacking attacks themselves. Phishing attacks typically have telltale signs such as unfamiliar senders, strange domain names, spoofed web pages or emails, and messages with links or attachments that weren’t requested.

Leverage free online resources to train yourself and your employees to better identify phishing attacks, and avoid messages that appear suspect.

Sadly cyber attacks and online fraud are becoming an increasingly prominent part of personal and business environments today, but there is still plenty that can be done to reduce the odds of an unwelcome attack.

By following these tips and training employees to do the same, individuals and businesses alike can ensure they are not an easy target.

Comments

Popular posts from this blog

Microsoft Ends Support for Windows 10 Version 1803, Users Advised to Update Now to Get New Features

Microsoft has announced that the company will no provide updates to PCs running Windows 10 version 1809 (aka October 2018 Update) as it will no longer support the outdated operating system. Originally, support for the Windows 10 version 1809 was supposed to end early this year; however, it was delayed to the COVID-19 pandemic, therefore giving more time to users and IT professional to update their systems. As a result, users with Windows 10 Home or Pro editions of Windows 10 version 1809 will not receive monthly security and quality updates containing protections from the latest security threats. To update to latest Windows OS, users can head to Settings > Update & Security > Windows Update. Although several users are likely using the Windows 10 version 1909 as Microsoft started rolling out the automatic update last December, the newer version might be unavailable to those who turned off automatic updates. Typically, Microsoft brings new features for Windows 10 versions fo

Google announces new career certificates for tech job-seekers

Google launched three-course certifications to help job seekers and professionals. It is to enhance their skills and help them grow in major fields.  Google has launched three major certification courses for job seekers to help enhance their career in the technology domain. The flexible online training will help job seekers to polish their skills in their high-growth fields and track jobs.  The courses will target the major fields such as User Experience Design (UX), Project Management, Data Analytics, IT support, and Android Development. This is a way to expand the employer consortium, get job seekers enrolled with the latest certifications, and introduce new tools to improve the job search.  CEO of Google and Alphabet, Sundar Pichai, announced the new Associate Android Developer certification that will help in Android development for entry-level jobs. It is predicted that by 2025, the US market will open up to 1.3 million jobs.  Here are the Google Career Certificates that users can