Posts

It’s important to use cybersecurity best practices to keep your data secure. Following these steps will help you to protect your computer from hackers and viruses:

1. Firewall Protection

Firewall protection software was developed to build a barrier between your data and outside interference. The firewall protects against unauthorized access from cyber attackers and alerts the system in case of any attempts. It’s important to turn on your firewall before using the internet.

2. Antivirus Software

Antivirus, also known as Anti-malware, is a program that protects your computer from viruses and malware. The removal, detection, and prevention of malware are all accomplished by antivirus software.

3. Anti-Spyware

Anti-spyware is specialized software that secretly monitors and gathers user data and information. It prevents direct interaction with malicious websites and blocks unwanted ads and search results directed toward the websites you visit. Some spyware collects financial information and passwords for every keystroke and can block all potential threats in real time.

4. Use Complex Passwords

A more complex password is the easiest method to protect your computer from being hacked.

To create a strong password, the best practices are using numbers, passphrases, password generators, and using 10 or more characters. Avoid reusing passwords and using easily memorable combinations like birthdays and other info related directly to you. If the information in your password can be found on your social media page or a simple Google search, remove it. 

5. Two-Factor Authentication

As you now know, passwords act as the first line of defense against cyberattacks. Enabling two-factor authentication (2FA) is the second. 2FA provides improved security by requiring additional authentication at the time of login. Usually, two-factor authentication sends a unique, one-time code to a personal phone number or an authentication application generates a code, both are required to be entered correctly in addition to a password to successfully access an account.

6. Backup Your Computer

If you fall victim to a data breach, it becomes nearly impossible to recover your data if it has not been backed up prior. It’s important to back up your data every 24 hours to ensure you do not lose important information. You should specifically back up your data to the cloud, an external hard drive, and the original device.

It is easy for hackers to delete or alter your data and/or destroy your system. Be prepared and keep your data safe. Backup storage is available on macOS “Time Machine”. While for Windows, it is accessible in “File History”.

 The Most Important Cyber Security Tips

  1. Realize that you are an attractive target to hackers. Don’t ever say “It won’t happen to me.”

  2. Practice good password management. Use a strong mix of characters, and don’t use the same password for multiple sites. Don’t share your password with others, don’t write it down, and definitely don’t write it on a post-it note attached to your monitor.

  3. Never leave your devices unattended. If you need to leave your computer, phone, or tablet for any length of time—no matter how short—lock it up so no one can use it while you’re gone. If you keep sensitive information on a flash drive or external hard drive, make sure to lock it up as well.

  4. Always be careful when clicking on attachments or links in email. If it’s unexpected or suspicious for any reason, don’t click on it. Double check the URL of the website the link takes you to: bad actors will often take advantage of spelling mistakes to direct you to a harmful domain. Think you can spot a phony website? Try our Phishing Quiz.

  5. Sensitive browsing, such as banking or shopping, should only be done on a device that belongs to you, on a network that you trust. Whether it’s a friend’s phone, a public computer, or a cafe’s free WiFi—your data could be copied or stolen.

  6. Back up your data regularly, and make sure your anti-virus software is always up to date.

  7. Be conscientious of what you plug in to your computer. Malware can be spread through infected flash drives, external hard drives, and even smartphones.

  8. Watch what you’re sharing on social networks. Criminals can befriend you and easily gain access to a shocking amount of information—where you go to school, where you work, when you’re on vacation—that could help them gain access to more valuable data.

  9. Offline, be wary of social engineering, where someone attempts to gain information from you through manipulation. If someone calls or emails you asking for sensitive information, it’s okay to say no. You can always call the company directly to verify credentials before giving out any information.

  10. Be sure to monitor your accounts for any suspicious activity. If you see something unfamiliar, it could be a sign that you’ve been compromised.

“These tips were learned from Cisco Umbrella.
Please be sure to follow them on Facebook by clicking here.” 
Technology image created by Creativeart – Freepik.com