- Email is NOT Secure
Email is not as private as people sometimes think it should be. Left unencrypted, email could potentially be read by a hacker. You cannot always trust that the name of the sender in the “from” field is the actual sender of the email. In some cases, a hacker may try to disguise themselves in an attempt to steal your information (Phishing). Often, an attachment may not be what is advertised, you may think you are receiving the latest company financials in Excel, but in reality, opening that attachment may lead to the installation of ransomware.
- How to Recognize Phishing Attempts and Prevent Identity Theft
A phishing attempt is an attempt by hackers to try to gain information about you, usually by tricking you to go to an insecure website and steal your passwords. How it usually happens is an email is sent claiming to be from reputable or trusted organization. That organization may include links to a fake website, where they may ask you to enter your username and password or other personal information. One way to recognize these attempts, is that most are poorly written with many spelling and grammatical errors. Carefully inspect web links, as sometimes these link to fake web sites.
- Why You Should Keep Your Computer Updated
Having the latest and greatest version of software on your computer can help protect you from already established vulnerabilities. Operating systems, firewalls, and anti-virus software all have regularly scheduled updates to provide the best possible security available. Always update your systems!
- How to Use network security tools
Network security tools are useful to help prevent unlawful access to network systems (firewalls), spam filters to protect you from unwanted email, and anti-virus protection to protect your systems from viruses, are all important security tools. Many more tools, such as vulnerability management tools, can help secure your network by telling you where the vulnerabilities are in your network.
- Secure Passwords Are Important
Your password is the key to all your information on your organizations systems. Follow those steps to ensure you have as secure a password as you can. After all, why make it easy for hackers. Do use a combination of uppercase and lowercase letters, symbols and numbers and don't use commonly used passwords such as 123456 or the word "password.” Ensure your user passwords are at least eight characters long. The more characters and symbols your passwords contain, the more difficult they are to guess. Don't write your passwords down, share them with anyone or let anyone see you log into devices or websites and do change your passwords regularly. Make sure you log out of websites and devices when you are finished using them. When possible, use Two-Factor Authentication (2FA) whenever possible. 2FA adds another layer of security to any account you may be logging into.
- How to Prevent Data Breaches
Scammers are always trying to steal sensitive data. Sometimes, unscrupulous competitors could be trying to steal your business’s sensitive data. Beware of phishing and social engineering scams. Ensure that company data is backed-up onto secure servers. Ensure that your security systems and software are up to date.
- Mobile Protection
From physical theft of phones, to shoulder surfing in a crowd, your mobile data is at risk. Never leave mobile phones, tablets and laptops unattended. Never read sensitive data in public places. In all cases, your mobile devices should be password protected.
Following all seven steps will help secure your organization. To learn more about the 7 things your boss wants you to know about information security, visit our website: www.uzado.com