DIGITAL SECURITY WILL KEEP YOU SAFE

From your tablet to your computer, including your mobile phone, are you really mindful of your digital security?

DIGITAL SECURITY WILL KEEP YOU SAFE
To find out, discover the 10 basic rules to protect yourself on the Internet:

1. Adopt a strong password policy

This is one of the simplest things to do, and yet many neglect it: with each new registration on a website, you need to adopt a solid password management.

To do this, here are some good practices to keep in mind:

Use a different password for each access: this is the first thing to do to limit the possible damage in the event of hacking.

Use a sufficiently long and complex password: 8 to 12 characters containing lowercase, uppercase, numbers and special characters.

As part of your personal navigation, change your passwords at the slightest doubt of fraudulent use.

In the professional context, do not wait to suspect fraud and change your passwords regularly and systematically.

Use a word no one can guess: no one should be able to put it back together, not even your loved ones. So avoid any easily accessible information such as your date of birth or the name of your dog.

Never communicate your password to a third party: No serious company or organization will ever ask you to communicate your password to them. If you are asked for your password after clicking in an email, consider that you are facing a hack or scam attempt.

Use a password manager: download a tool like KeePass which will remember all your passwords and allow you to generate sufficiently long and complex random passwords.

Choose a particularly strong password for your mailbox: the email address is often required to register on a website. At this address, you can receive the password reset links for the online accounts you are registered with. If a cybercriminal managed to hack your email, they could take control of all your online accounts (social networks, bank account, administrative sites, etc.).

2. Back up your data regularly

Save your data regularly personal and professional when protects you from  failure , of  loss , of  theft,  of  destruction  of your hardware or  computer hacking . And yet, the majority of Internet users do not set up a regular backup routine until after having suffered a first loss of data. Why wait to be a victim when you can set up this routine today?

Here are the different options available to you for backing up your digital data:

Case no.1: Back up a small amount of data

If you want to store a limited amount of data, a USB stick or even a recordable DVD should suffice.

You can also opt for an online storage service (cloud). There are free or paid solutions depending on the desired storage capacity.

Case 2: Back up a large amount of data

For performing larger backups, the external hard drive is the best option.

If you are still running out of space and are comfortable with computers, you may also want to consider network attached storage. Create your own FTP server or buy a Network Attached Storage (NAS): you can then share files on a server hosting different hard drives.

3. Digital security: update it regularly

Device or software that is not up to date is vulnerable and more susceptible to cyber-attacks.

Here are some tips to avoid exposing yourself to this risk:

Identify all of your devices and software used.

When offered an update, do it immediately.

Download updates only from official publisher sites.

On your devices, enable the option to automatically download and install updates if it exists.

Anticipate your periods of inactivity by planning your updates.

Beware of bogus updates offered to you on the Internet. Our tip:  always check the URL of the site you are on.

4. Protect yourself against viruses and other malware

On the Internet, malicious files are many and varied.

Viruses, worms, Trojan horses, or spyware are just some of the techniques commonly used by hackers. To protect yourself from these intrusions, it is essential to have these two tools:

Antivirus

A well-configured firewall that will block unwanted connections from your computer

Perform analyzes (or scans) of your computer, your mobile phone, your tablet regularly to identify the presence of malicious programs. When your antivirus asks for its virus databases to be updated, do so immediately. Likewise, when it alerts you to a suspicious file and offers to delete it or quarantine it, carry out the operation as soon as possible.

In addition, some best practices are in order when using external storage devices, such as USB keys or external hard drives:

Never use unknown or abandoned service or equipment.

Assign a specific use to each USB key to reduce the effects of possible contamination.

Encrypt the contents of your storage devices to prevent hackers.

5. Avoid public or unknown WiFi networks

While they can be very useful, public WiFi networks are a boon for hackers. Very easy to access, these networks can be controlled by cybercriminals to intercept your personal information.

Here are some tips to avoid connecting to these networks or, if you do, use them securely:

To prevent your devices from automatically connecting to these networks, turn off wireless connections (WiFi, Bluetooth, NFC, etc.) when you are not using them.

When you can, choose the private 3G or 4G connection associated with your mobile subscription. And don't forget to secure the connection sharing of your devices with a password: this will prevent anyone from having direct access to your shared data!

If you have no other choice but to use public Wi-Fi, make sure you never carry out any sensitive transactions (payment by credit card, tax declaration, requesting confidential information, etc.) and if possible use a virtual private network (VPN).

6. Digital security: Separate professional and personal uses

With the proliferation of Internet access, your personal and professional information becomes accessible from anywhere. It becomes possible to:

Check your professional emails in your living room.

Take a look at your social networks during a coffee break at the office.

Reread an important contract on the train then watch a sports broadcast.

Thus, with the Internet, the border between professional and personal life is becoming more and more porous. To best secure your digital uses in these different environments, start by using a different password for each professional and personal service to which you have access.

Also distinguish your uses on social networks:

Avoid sharing business information on your personal social networks. Sharing and interpreting information can quickly hurt your business.

Conversely, you probably don't want your business to know about everything you post in your private circle.

The same goes for e-mail and online storage services. Don't mix up your messages and use separate cloud services to store your business and personal data - without it you risk a wrong recipient at best and at worst endanger your business and find yourself legally responsible of the situation.

7. Avoid browsing questionable or illegal sites and be vigilant when downloading a file

In general, avoid going to questionable or illegal sites. Some are likely to harbor counterfeits and may contain viruses. Do not use unofficial platforms or download files from illegal download sites: many files are infected and may contain viruses and other malware. Some pornographic sites are also virus nests, be careful.

To download new applications to your computer, tablet or smartphone, we recommend that you only use official stores or the site of the application itself.

8. Control the permissions of user accounts

The same workstation, server or software can be accessed by several users, each with more or less restricted access depending on their permission level.

When it comes to adding users to a device or service, and therefore choosing the level of permission to grant them, always apply the rule of minimum privilege: make sure that each user has only the permissions they have need.

This simple principle limits the damaging consequences in the event of an attack and considerably increases your digital security.

How to do?

By default, all users of a workstation or server must have a limited level of access to the operating system and information.

Then, customize as much as possible the attributions and possibilities of each one according to his needs.

Finally, keep an eye on each account and its use.

9. Digital security: Be vigilant about links or attachments in e-mail messages

Phishing (or phishing English) defines a criminal technique of impersonating a known organization (bank, operators, etc.) or relative to collect confidential information.

Here are some simple recommendations to avoid it:

Do not share personal or business information by messaging or over the phone.

If you receive a message containing a link, position the mouse cursor (without clicking) on this link to display the address to which it actually points.

Double check the website address before entering any data. If this does not correspond exactly to the site concerned, it is most likely a fraudulent site.

If the site allows it, activate two- factor authentication to secure your access.

Use different and complex passwords for each site and application.

Enter the address of the site concerned directly in your browser.

If in doubt, contact the organization directly to confirm the message or call you have received. If you provided banking information, oppose your cards and file a complaint.

10. Pay attention to personal or professional information that is disseminated on the Internet

In general, everyone should feel responsible for what they post on the internet. Never communicate sensitive information on sites which seem to you insufficiently protected and never when the mention “Not secure” appears on the left of the address of the Internet site.

Likewise, be careful to identify the people with whom you speak on the Internet. If you are in doubt about an identity, for example because of an unusual way of writing, contact that person via another means before answering any questions.

Finally, always be vigilant: even your friends or contacts can send or share malicious content to you, unintentionally.

With these 10 digital security rules   in mind, you are better protected to surf the Internet peacefully!

Comments

Popular posts from this blog

What Is the WeAreDevs Virus?

WHAT IS BOTNET ATTACK?

Original or Pirated Virus Protection Which Is Better