30 Tips For A More Secure Company On 2019

30 Tips For A More Secure Company On 2019

We are set to end 2018, where we here at Hackercombat.com informed you for the whole year the cybersecurity news you need to know. And just like clockwork, the new year provides all of us a refreshing start. To start 2019 right is to start the New Year’s resolution of a better cybersecurity behavior, especially in the enterprise. The United Kingdom’s Information Commissioner’s Office has exposed since January 2018 that four of every five security breaches were the direct result of human error, dealing with incorrect data handling compared to a genuine case of hacking.

We do not discredit the hackers, they continued their research and development in 2018 creating a new threat for the world. We saw the fruits of their labor with huge uptake of cryptojacking malware, replacing the ransomware which was very rampant in the previous year, 2017. But compared to human error from people working in the enterprise, the chance of dealing with an external threat than an internal one is an apple to orange comparison.

Aside from building a robust system, efficient update/patching policy and well-developed communication line with the service providers (ISPs, hardware supplier, etc.), an employee needs to know not only how to use the system, but also detect indications of an abnormal situation while using the system.

Here are some safe computing tips everyone in the enterprise should always remember:

  1. Request additional file storage for projects with a large number of files.
  2. Avoid opening attachments from an untrusted source.
  3. Avoid providing your user ID and password or other confidential information in an email or in a response to an email.
  4. Never transact with a website, unless it provides TLS encryption.
  5. Save copies of important outgoing email.
  6. Be wary of email phishing scams
  7. Never click links from an unexpected email message.
  8. Lock your computer when not attended.
  9. Understand the type of data stored on your machine.
  10. Log off or shutdown when going home
  11. Organize your email and files by project or work type.
  12. Disconnect your computer from the wireless network when using a wired network.
  13. Patch and update your operating system, Microsoft release their patches every second Tuesday of the month.
  14. Install and update your anti-virus and anti-malware with the latest security definitions.
  15. Avoid using personal accounts for business workflow.
  16. Create a unique user ID, without administrative privileges when sharing a computer with others.
  17. Enable pop-up blocker on your browser.
  18. Make an informed and rational decision prior to installing or downloading software on your computer.
  19. Lock your office computer when you leave.
  20. Avoid storing personally identifiable information on local storage devices, e.g. laptop, USB, smartphone.
  21. Back up your data regularly
  22. Segregate your personal files from your business files.
  23. Organize your files by project or work type.
  24. Make sure to securely delete data from systems before disposal when replacing or upgrading your computer.
  25. Be cautious when handling attachments and links in email, chat rooms or instant messages.
  26. Avoid responding to questions via pop-up windows, or click on links in a pop-up window
  27. Be cautious when using Peer to Peer File Sharing applications.
  28. Avoid responding to questions via pop-up windows, or click on links in a pop-up window
  29. Avoid clicking advert links that pretend to be the legitimate download link on websites.
  30. Be cautious when using Peer to Peer File Sharing applications.

Julia Sowells862 Posts

Julia Sowells has been a technology and security professional. For a decade of experience in technology, she has worked on dozens of large-scale enterprise security projects, and even writing technical articles and has worked as a technical editor for Rural Press Magazine. She now lives and works in New York, where she maintains her own consulting firm with her role as security consultant while continuing to write for Hacker Combat in her limited spare time.

0 Comments

Leave a Comment

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register