How to protect & prevent from cyber threats
based on data collected by CASES Diagnostics and Fit4Cybersecurity
Passwords provide the first line of defence against unauthorized access to your computer or other IT infrastructure.
Passwords provide the first line of defence against unauthorized access to your computer or other IT infrastructure.
To make it even more secure, use a combination of numbers, capital and lower-case letters, as well as punctuation marks.
The password you choose should be easy for you to remember but hard for others to guess. One method can be to use a passphrase: pick a phrase that you can remember and take the first letters, numbers and punctuation to generate a seemingly random character combination:
Each password must be used for a specific access: use separate passwords for different logins. Make sure you submit your password to the right system.
Change your passwords immediately if you think they might have been compromised.
To manage your passwords, use a password manager. Also, avoid saving your passwords in the browser.
Passwords should not be shared with others, and you should never disclose them to anyone, regardless of the circumstances.
Two-factor authentication provides an extra layer of security: the user should provide an additional factor for authentication: security token, code sent by SMS (one-time password), etc.
A Wi-Fi network is a wireless network that connects to your Internet router and wireless-enabled devices using a wireless radio signal.
Existence and adherence to clear safety policies and rules are essential for the continuity of an organization’s activities.
Existence and adherence to clear safety policies and rules are essential for the continuity of an organization’s activities.
People are often the weakest link in cybersecurity, therefore, knowledge share, awareness-raising is key to fight against the never-ending flow of threats and attacks.
People are often the weakest link in cybersecurity, therefore, knowledge share, awareness-raising is key to fight against the never-ending flow of cybersecurity threats and attacks.
One of the biggest risks of cyber threats is that our data can be lost. Only appropriate backup management can provide acceptable solution to this threat.
One of the biggest risks of cyber threats is that our data can be lost. Only appropriate backup management can provide acceptable solution to this threat.
Subtle psychological techniques to obtain access to confidential data or systems by attacking users of an IT system and get them to share useful information.
Social engineering is based on subtle psychological techniques to obtain access to confidential data or systems by attacking users of an IT system and get them to share useful information.
Work from home has become the new norm to many of us. Below are the do's and don'ts you need to keep in mind while working from home.
Follow these best practices in cybersecurity to ensure the essential safety standards for efficient work and keep up productivity while working from home.
Which are the things you should avoid doing while working from home? Follow these essential safety guidelines to make your home a cyber-secure place to work.
before, during and after your vacation. Cybersecurity tips to avoid your holiday becoming a nightmare.
Preparing for your vacation is not only about choosing your destination and booking your accommodation but also about considering what technical devices you bring and how to use them.
Keep your devices up-to-date at all times, so they are less vulnerable to a cyberattack. Also, prepare for the worst: backup your data to have them even if your device is stolen or lost.
First, use strong-enough passwords on your devices and a secure swipe pattern lock on your smartphone. Second, set an automatic device lock asking for the access code after a specified time of inactivity. Delete apps you are no longer using. Take the minimum amount of data with you (on your devices) as possible. And last but not least, check your privacy settings on your apps and understand what data they can access on your device before downloading.
Think twice before setting up your OOO (Out of Office) replies: the fewer people know you went on vacation, the better. If you want to send OOO messages, set up rules so only your colleagues got such replies. Do not forget: an automatic OOO response is a confirmation that your email address exists.
Set up a VPN service before travel (if you have not done it already): when at a hotel or café, you can seldom trust the Wi-Fi connection, so better be prepared with a VPN endpoint to connect to immediately when away from your office or home.
Enjoy your deserved vacation, but do not forget about the basic guidelines and protect yourself from a lot of inconvenience and annoyance while on holiday.
If your device has been lost or stolen, use the ‘Find my device’ functionality and try to locate your device. You can remotely erase data on your device if it is turned on and connected to the network. It is crucial to do a remote wipe very quickly before your data become compromised on your device.
Keep your devices close at hand or in a secured place when not in use. Enable ‘Find My Device’ on Android and ‘Find My’ functionality on your iPhone or iPad.
When you turn on the Wi-Fi or Bluetooth, they connect to a network and track your whereabouts. If you do not need them, switch them off.
Always verify which network you are supposed to use and the credentials for login. Make sure your device asks your permission before connecting to a Wi-Fi network, so you can check which network you want to log in to. Be careful about insecure Wi-Fi hotspots and do not transmit personal info or make purchases on unsafe networks. Consider using a VPN if you need a more secure connection.
Be extremely cautious in public places like internet cafes, airports and hotels. Do not connect to applications where you need to log in with personal credentials. Do not plug in any USB sticks or other storage media in public computers, and avoid using your USB plugs even for charging. If the computer is infected, your USB will be as well. Use a shared computer in such areas only when absolutely necessary.
Think twice before posting pictures that would reveal you are not home. It is never a good idea to post images of yourself while on vacation. Malignant people might find your postal address by checking your social media sites (or from other sources) and break into your home while you are on vacation. Set your social media accounts to only allow you close circle to view your posts and content.
On holidays we are often susceptible to downloading mobile applications to make our stay easier and improve our experience in the places we visit (hotels, museums, public transport, etc.). The first step is to avoid installing them if it is not necessary and if not, make sure you always download them from official shops such as the App Store and Google Play.
Hopefully, you had a wonderful holiday and got a lot of memorable experiences. You took hundreds of images and stored them on different devices in different formats. You visited various websites, downloaded images, and purchased online…
Clear your browser cache to avoid any data leaksand remove any unnecessary apps from your devices as it can abuse permissions you have given.
Do a quick inventory of all your data and removable storage media: do you and all your family members have all flashcards, USB sticks, smartphones, etc.?