The 9 Cybersecurity Practices All Firms Should Follow in 2019
This new year, organizations and their employees from the CEO to the humble clerk, as well as individual computer users need to understand that everyone are each others keeper when it comes to the aspect of cyber security. We give you 9
Make backup copies
Prevention is better than cure: In the case of a situation where you lose data for lack of security policies on your computer, for not carrying out something of everything we have told above, the most common situation is despair. But if backups or backups will be important, when everyone would be flooding in tears, who did the task and supported their data will take it as an experience. There is no VPN and antivirus paranoia that wins over the security provided by the existence of data on another disk or cloud services. The market is full of competitive products and services for online cloud storage backup. It is a mortal sin not having a backup in 2019.
Create better passwords and change them every six months
More difficulty, less predictability. A first and obligatory place is in your text field: “enter a new password”. It is that appealing to the same password of years for all the services to which you are subscribed is really a risk, because if you discover one; discover everything So the best thing is to create passwords for service or service genre, besides having a password manager, forget about “remember password” in public places and use application to create encrypted keys that even the most nerd of MIT could not guess without It will take your whole life.
Make it a habit to close sessions when finished
An entry window is also an exit window. The human being is curious by nature, and as soon as he sees something that is not his placed at his disposal, the most probable thing is that, at least out of curiosity, he makes use of that gift of becoming. This usually happens in cybercafés, in work offices and in all the places where computers are shared. If you open Facebook, Gmail or any other service, get used to closing the session before getting out of the chair to leave. With this you will avoid entering the immense rate of users who lose data by leaving their sessions open there. A good exercise to generate the habit is to do it at home too, every time you get up from the computer; close the session
Avoid private operations in open and public networks
Share the connection, but not the data. One of the most complicated issues for many tourists is to be on vacation and have to make banking movements from the open network of your hotel or from some of the open networks of the place. This means comfort, but also possibilities for sniffing to take shape and bank, social, mail, etc. accounts. In a blink of an eye. To avoid this, you should avoid connecting, and that’s like telling you to cut the light of your home so you never get electrocuted. Therefore, it is best to use alternative means such as VPN servers or, more accessible, extensions such as Blacksheep, access only to sites with HTTPS protocol and have the firewall at maximum attention.
Disconnect from the internet when you do not need it
Lower degree of exposure, lower infection rate: There are exceptions by heaps, but the highest number of infections occur when computers are connected to the network, because spywares and malware perform their actions communicating with servers or sending information using open ports in your connection So if you want to lower the rate of infection possibilities and you use the computer for a long time without needing a connection to the network (games, design, writing, etc) or if you are going to sleep or if you are going to be absent , by disconnecting the internet, you avoid something happening in your system without turning off the computer. Simple, but 100% effective.
Update, Update & Update
More recent, more resistant. This should be a truism, it is as simple as thinking “if I use an application that is outdated three months ago, I have three months of unresolved vulnerabilities,” which will make your system more prone to receive malware. The reluctance to update software (including operating system) is due to costs, laziness and also, fundamentally, to forgetting. That is why it is good to have some applications that check if there are updates available for the software we have installed and recommend us to download it. Update soft does not mean that with the new version other holes can not come, but it is less usual than the previous case.
Avoid software with recurring associations to conditions
Ariana Grande.mp3.exe is not an MP3, but an executable code pretending as an MP3 file. Due to the amount of scams that exist in relation to the web services, applications and what happens to them, to have a clear idea of which programs do not contribute to your computer being a refuge from viruses and malware, is somewhat complex. The legitimacy of a software, because while many programs promise to eliminate malware, they themselves are the ones that are reported as infections, besides polluting your system to be able to sell you the solution.
Beware of attachments in your email
If you do not know it, do not open it. With that logic of thought, you would have to stay safe for a long time from emails from strange addresses or that have attachments such as .pps, .zip, .exe, etc. As much as you’re not having a good time, and the invitation to take miracle pills for free seems tempting … Is it worth the risk? Even when an email with an attachment you did not expect was sent to you by an acquaintance, it is best to ask him by any means if he has sent it to be a little more secure.At a software level, what you can do is mail analysis through your favorite antivirus or anti-malware application. Distrusting, without reaching paranoia, is a good tool to avoid falling under the yoke of threats.
Educate those who share the computer with you, the more you know, the less you are wrong:
This point aims to make it clear that while you can be a paranoid computer security, when you have it in your hands an inexperienced, few of your resources will fulfill their function and the computer You will have many chances of becoming infected. To avoid this, especially for those who have a familiar computer or share it in their work, it is best to educate those who have contact with computers in general. Both those who share yours and your surroundings. Teaching them this article, telling them your own experience, recommending security software and instructing them in the art of being aware of the danger that exists every time we connect the network cable to the computer. Caring for our systems is an obligation that users have to assume when the creators of the software or operating system have made mistakes, so ultimately security depends on us.
Julia Sowells919 Posts
Julia Sowells has been a technology and security professional. For a decade of experience in technology, she has worked on dozens of large-scale enterprise security projects, and even writing technical articles and has worked as a technical editor for Rural Press Magazine. She now lives and works in New York, where she maintains her own consulting firm with her role as security consultant while continuing to write for Hacker Combat in her limited spare time.