10 top cybersecurity tips to make you saferâ
Technology is more prevalent than ever and keeping your business safe is more important than ever
10 top cybersecurity tips to make you safer
Technology is more prevalent than ever and keeping your business safe is more important than ever. Whether you are an individual or a business leader, you need to be protecting your data đĄď¸.
You have to understand that youâre an attractive target đŻ for cyber criminals. If you have money đ¸ (doesnât matter how much), data đď¸ or a place to work đ˘, youâre going to be targeted. Itâs not even personal, as cyber criminals automate most of their attacks.
â¨As a Tech Agency, we meet daily with companies of all sizes – from small businesses to big enterprises. Surprisingly enough, many businesses are struggling to understand what they need to do to protect themselves while also being inundated with slick marketing about the latest tools 𧰠that can solve all their problems. A common misconception is that cybersecurity is only a question of technology. Bad IT practices and human error đ cause the majority of security breaches. The power to protect yourself is very much in your hands. đĽ
So, what can you do to keep your data safe and out of the wrong hands? Looking to sink your teeth into some good security tips you can actually apply? đĄ
The good news is that todayâs range of action-ready cybersecurity advice might be just what you need. đ
There are many ways in which you can improve your online safety and theyâre all FREE or almost FREE đ to use and apply. Youâll be surprised by the things you can do to better secure your data! All it takes is spending some time reading the right things and adjusting a few settings. Applying these security tips is very simple.
Among all the cybersecurity tips I can think of I would recommend that you start with the following ten. đĽ
Cyber Security Tip #1: Do a security risk assessment checklist
How do you rate your organizationâs ability to respond to security threats and vulnerabilities? â ď¸ What types of compliance risks exist in your operating market? âĄHow severe are these risks? What type of data do you have stored on your devices? What online accounts do you have? Which do you use more often? đ
If you canât answer, make a security risk assessment checklist to assess and mitigate the security risks effectively!
In âThe Art of Warâ, Sun Tzu said that you should fully know your enemy and know yourself. Turn this principle into a battle plan! âď¸
So, after you made the list, evaluate how valuable is the data that you keep on them. What would happen if you wouldnât have access to them anymore or that information was lost, deleted or leaked online?
How do you keep the most sensitive information safe? Who else has access to that data?
Cybersecurity Tip #2: Back-up your data đ
What security measures did you take in order to prevent something to happen to your data? Achieving absolute security is absolutely impossible! No system is impenetrable. Of course, this doesnât mean you shouldnât take all the necessary measures against cyber criminals. Itâs just that you shouldnât rely completely on them. Important data can be lost as a result of a security breach. To make sure youâre prepared to restore data once itâs lost, you should ensure your important information is backed up frequently on the cloud or a local storage device. These days, storage doesnât cost much. Thereâs no excuse đ ââď¸ not to have a backup of important data. Remember, malicious threats and hackers donât always want to steal your data, but sometimes the end-goal is to encrypt or erase it. Ransomware is one of the biggest cyber threats out there. What it does is it encrypts ALL your data and locks you out! đą Back it up to have an ultimate recovery tool.
Before backing up to Cloud platforms âď¸, be aware that these that these storage sites can also be the target of computer attacks and that these solutions involve specific specific risks. Be careful when reading đthe general conditions of use of these services.
The contracts proposed in the framework of generic offers do not generally cover these risks. Ensure data confidentiality by making it impossible for unauthorized persons to read it by encrypting it đ with encryption software before copying it to the cloud.
Cyber Security Tip #3 : Beef up your passwords
One of the key pieces of advice that all cyber security specialists give is so simple itâll blow your mind: never, ever (ever, ever, ever!) reuse passwords! â Promise yourself, here and now, that youâll always use unique, strong passwords for every account.
Determine rules for the choice and size (length) of passwords and enforce them and make sure they are respected. Define passwords of at least 12 characters of different types (upper case, lower case, numbers, special characters) is crucial to your cybersecurity. More characters mean more possibilities for the program to try. The result is that the password takes longer to crack and is, therefore, more secure.
There are two methods to choose your passwords:
- the phonetic method: ” You canât have everything for you. Where would you put it?â” will become ” Ucnhe4U.WwUpi?”,
- the method of the first letters: the quotation “one yours is better than two you will get!” will give âOyibt2wg!â.
Although itâs easier to remember a single password for all your different accounts, itâs not the most secure! The best practice is to vary your password for every different site and account you use.
Remind employees not to keep passwords in files or on post-it notes and make employees aware that they should not pre-save their passwords in browsers
Canât remember them? đ§ (Of course you canât. I canât either đ.) Use a secure password bank protected by two-factor authentication.
Personally, I would never leave my sensitive data on a free password manager. However, there are some really good free password managers which offer powerful password security, good user interfaces, and some nice extra features. LastPass, Avira Password Manager and Roboform are all good programs. Many offer free versions, and some are totally free. And, if you use Digiposte, OneDrive, Google Drive or the like, you can save the password database on your cloud drive and it will be accessible anywhere.
Cyber Security Tip #4 : Get your 2-FA on
Itâs important to have a strong password, but itâs even more imperative to have two-factor, or multi-factor, authentication. Require two-factor authentication every time to access any databases storing sensitive information, even if the person requesting access is on-premises or logged into a work account. Two-factor authentication can save you from hackers. If you find passwords annoying, you might not like two-factor authentication much but itâs one of the best ways to protect you. Simply put, two-factor authentication adds a second step in your usual log-in process. A little of your time today, to save you from a whole world of trouble tomorrow.
Having a second step of authentication makes it so much more difficult for a hacker or a thief to break into your online accounts. Two-factor accounts protect from automated log-in attacks and against phishing emails. As such, the implementation of two-factor authentication (2FA) has become a necessity and it works. Figures suggest users who enabled 2FA ended up blocking about 99.9% of automated attacks. But as with any good cybersecurity solution, attackers can quickly come up with ways to circumvent it. They can bypass 2FA through the one-time codes sent as an SMS to a userâs smartphone.
Cyber Security Tip #5: Automate software and browser updates
In each Operating System (Android, IOS, MacOS, Linux, Windows,…), software or application, vulnerabilities exist. Once discovered, they are corrected by the editors who then offer users security updates. If you go to https://www.ssi.gouv.fr/agence/cybersecurite/ssi-en-france/les-cert-francais/, you will find the list of CERTs (Computer Emergency Response Team) in France. Did you know that updating your apps can prevent most of targeted attacks? Rule of thumb: keep your operating system and your applications up to date all the time in real time. You can configure your software to automatically install security updates whenever possible. If not, download available security patches available. Browser are also one of the most common security holes, if you donât keep them up to date. Cyber crooks frequently scan websites and PCs for vulnerabilities, such as outdated software. They use those backdoors to penetrate your systems and infect you with malware. Keep those browsers updated.
Cyber Security Tip #6: Dissociate administrator and users' roles clearly
How many people have the administrator password to access the central rights management system?
The number of account holders with elevated privileges, including of course accounts that provide access to the central rights management system, which are prime targets for attackers, should be reduced to only those for whom these privileges are necessary to perform their duties. Donât count on your good star. Donât pray to God đ (no matter if your God is an Apple or not). Itâs not a matter of it, but when youâll become a victim to a cyber-attack.
Last but not least, have a checklist of all the accounts that they had access to. Donât forget to remove their permissions when they leave.
Cyber Security Tip #7: Disable autorun for USB media
Does dropping an infected USB drive in a parking lot work when it comes to a hacker luring its prey into a digital trap? The answer is a resounding yes.đ ââď¸ Malware is easily spread via USB media when USB media autorun is enabled. Never insert foreign USBs or external hard drives in your PC or laptop. Even though they seem innocent, because of their common nature, they could still be infected with malware, viruses, Trojans or keyloggers. To make it easier to manage this feature, you can use group policy mechanisms (GPOs in Windows) to disable autorun and autoplay.
Cyber Security Tip #8: You still need antivirus (yes, really!)
Get protection for your connection even if you believe in Apple God! As soon as youâre connected to the web, itâs impossible to have complete and total protection from malware. Antivirus alone wonât keep you protected from all dangers that are out there, on the big dark web. However, you can significantly reduce your vulnerability by ensuring you have an anti-virus and at least one anti-malware installed on your computers. Do a bit of research and choose an antivirus đŚ you trust. Paid is better than free. Antivirus is still very necessary, so donât skip it.
Cyber Security Tip #9: Use a VPN to privatize your connections
For a more secure and privatized network, use a virtual private network (VPN). Itâll encrypt your connection, protect your identity and location. It act as an additional layer of security over your private network when employees visit external websites.
Make sure that you only navigate on secure websites, with SSL certificate đ (a website starting with https encrypts the data you put on the website and the data you get from it) and make sure your terminal has the WPA2 encryption protocol and activate it. Otherwise, use the WPA-AES (never use WEP encryption that can be broken in a few minutes). Your data is especially vulnerable when sent over public networks, especially while traveling. The information going to and from your device can be easily intercepted by others using the network. Useful if you have to use public Wi-Fi đś, VPN will help provide an additional layer of data encryption that can keep your safe from MitM (Man in the Middle) attacks.
Cyber Security Tip #10 : Use encrypted messaging apps
Encryption is a trending subject right now, although not everyone understands its applications or benefits just yet. Many of you could believe that all the private data shared via Skype, or other social networks is safe, but sometimes itâs just an illusion. Remember that most of popular apps like Twitter do not use end-to-end encryption, so your conversations and files may not be fully protected. Without end-to-end encryption, your conversations most likely will get into the hands of cybercriminals, and other malicious actors focused on stealing them.
Personally, I would recommend Olvid. Olvid is the first instant messenger providing a certification of Security from the French agency ANSSI đŤđˇ. Their security model is utterly game-changing and they offer free or premium version.
Their messaging system don’t rely on any trusted third party, either operators or their servers. Olvid system also encrypts metadata, thus guaranteeing the anonymity of interlocutors.
These are just some tips đĄ that can help mitigate the risk of cyberattacks and help you stay on top of your organizationâs security. Creating awareness of threats among the workforce and users đ§đťâđ¤âđ§đť is key to preventing cyber-menaces.
In the technological world đ, inform and train employees from day one about the security measures matter, and convince them that they are the FIRST line of defense đĄď¸ in preventing cyber-attacks.
Hereâs the good news. If youâre looking for an independant partner, Stroople provides customized solutions to design and build your technology dream team. You can choose the best solution that suits you. We provide tech talents pros whether you need to hire or outsource your cybersecurity team.