Stay Secure everywhere !!!!!!

8669820274?profile=original

Every one of us is so dependent on technology, which helps us to keep in touch with people and share information who are away from us. We use the email, social media, chat services using smartphones and computers to talk to them and even see them. As technologies gain a more important role in our lives, it also grows complexity. Technologies changes very quickly, there is always new guidance on what you should or should not be doing keeping up with security advice can be confusing. However, there are fundamental things you can always do to protect yourself. Regardless of what technology you are using or where you are using it.

Key steps to protecting yourself:

1. You:

First and foremost, keep in mind that technology alone will never be able to fully protect you. Attackers find ways to bypass even the most advanced security technology is by attacking you. If they want your password, credit card, or personal data, the easiest thing for them to do is to trick you into giving them this information.

For example: They can call you pretending to be Microsoft tech support and claim that your computer is infected, when in reality they are just cyber criminals that want you to give them access to your computer or they will send you an email explaining that there is a system update patch and ask you to click on a link to confirm your mailing address, when in reality they are tricking you into visiting a malicious website that will hack into your computer. This is how attacks such as Ransomware . The greatest protection against attackers is you. Be suspicious, then you can spot and stop most attacks.

2. Passwords:

The next step to protecting yourself involves using a strong, unique password for each of your devices and online accounts. A strong password means one that cannot be easily guessed by hackers or by automated programs. Try using a passphrase Instead of a single word, use a series of words that is easy to remember, such as “My favourite lecturer in my college is...?” The longer your passphrase is, the stronger. A unique password means using a different password for each device and online account. This way, if one password is compromised, all of your other accounts and devices are still safe.

Finally, one of the most important steps you can take to protect any account is enable two-step verification wherever possible. Passwords alone are no longer enough to protect accounts, Two-step verification is much stronger. It uses your password, but also adds a second step, either something you are (biometrics) or something you have (such as a code sent to your Smartphone or an app on your Smartphone that generates the code for you). Enable this option on every account you can, if possible. Two- step verification is probably the single most important step you can take to protect yourself.

3. Updating:

Make sure your computers, mobile devices, apps, and anything else connected to the Internet are running the latest software versions. Cyber criminals are constantly looking for new vulnerabilities in the software your devices use. When they discover vulnerabilities, they use special programs to exploit them and hack into the devices you are using. Please ensure that your computers and mobile devices are updated with latest updates, now you make it much harder for someone to hack you. To stay current, simply enable automatic updating whenever possible, and this applies to technology connected to a network, including Smart TVs, Wi-Fi Routers, gaming consoles.

4. Backups:

Data is valuable, so we should protect it and take steps to avoid losing it. There are basically four reasons how you might lose data:

• Human Error – accidental or unknowingly deletion of data, modification, or overwriting files

• File Corruption – software error, viruses and malware infections

• Hardware – drive failure, CPU failure, cooling system failure

• Site-Related – natural disasters or fires and even theft

Backup is the way to protect data, operating system can be reinstalled and so can applications, but it may be difficult or impossible to recreate original data , personal files, photos, and other information stored . It is essential that you always back up your important information and data so that data can be recovered when there was hardware or system failure. Due to latest threats computer's operating system or data may be corrupted or wiped out no matter how careful you are, you may be hacked. The only way to restore all of your information is from backup.

5. Wi-Fi hotspots:

Public wireless networks and hotspots are not secure, which means that anyone could potentially see what you are doing on your mobile device while you are connected. Limit what you do on public Wi-Fi and avoid logging in to key accounts like email and banking and other financial services on these networks. Consider using a personal mobile hotspot if you need a more secure connection on the go.

Find the downloadable file here

Want to share your learning with the community ? Click here to write a blog (Membership is free and mandatory for writing blogs)

8669820464?profile=original

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)