DIGITAL SECURITY WILL KEEP YOU SAFE
From your tablet to your computer, including your mobile phone, are you really mindful of your digital security?
To find out, discover the 10 basic rules to protect yourself on the Internet:1. Adopt
a strong password policy
This is one of the simplest things to do, and yet many neglect
it: with each new registration on a website, you need to adopt a solid password
management.
To do this, here are some good practices to keep in mind:
Use a different password for each access: this is
the first thing to do to limit the possible damage in the event of hacking.
Use a sufficiently long and complex password: 8 to 12
characters containing lowercase, uppercase, numbers and special characters.
As part of your personal navigation, change your passwords at
the slightest doubt of fraudulent use.
In the professional context, do not wait to suspect fraud and
change your passwords regularly and systematically.
Use a word no one can guess: no one
should be able to put it back together, not even your loved ones. So avoid any
easily accessible information such as your date of birth or the name of your
dog.
Never communicate your password to a third party: No
serious company or organization will ever ask you to communicate your password
to them. If you are asked for your password after clicking in an email,
consider that you are facing a hack or scam attempt.
Use a password manager: download
a tool like KeePass which will remember all your passwords and allow you to
generate sufficiently long and complex random passwords.
Choose a particularly strong password for your
mailbox: the email address is often required to register on a website.
At this address, you can receive the password reset links for the online
accounts you are registered with. If a cybercriminal managed to hack your
email, they could take control of all your online accounts (social networks,
bank account, administrative sites, etc.).
2. Back
up your data regularly
Save your data regularly personal and professional when
protects you from failure , of loss , of
theft, of destruction
of your hardware or computer
hacking . And yet, the majority of Internet users do not set up a regular
backup routine until after having suffered a first loss of data. Why wait to be
a victim when you can set up this routine today?
Here are the different options available to you for backing up
your digital data:
Case
no.1: Back up a small amount of data
If you want to store a limited amount of data, a USB stick or
even a recordable DVD should suffice.
You can also opt for an online storage service (cloud). There
are free or paid solutions depending on the desired storage capacity.
Case 2:
Back up a large amount of data
For performing larger backups, the external hard drive is the
best option.
If you are still running out of space and are comfortable with
computers, you may also want to consider network attached storage. Create your
own FTP server or buy a Network Attached Storage (NAS): you can then share
files on a server hosting different hard drives.
3.
Digital security: update it regularly
Device or software that is not up to date is vulnerable and
more susceptible to cyber-attacks.
Here are some tips to avoid exposing yourself to this risk:
Identify all of your devices and software used.
When offered an update, do it immediately.
Download updates only from official publisher sites.
On your devices, enable the option to automatically download
and install updates if it exists.
Anticipate your periods of inactivity by planning your
updates.
Beware of bogus updates offered to you on the Internet. Our
tip: always check the URL of the site
you are on.
4.
Protect yourself against viruses and other malware
On the Internet, malicious files are many and varied.
Viruses, worms, Trojan horses, or spyware are just some of the
techniques commonly used by hackers. To protect yourself from these intrusions,
it is essential to have these two tools:
Antivirus
A well-configured firewall that will block unwanted connections
from your computer
Perform analyzes (or scans) of your computer, your mobile
phone, your tablet regularly to identify the presence of malicious programs.
When your antivirus
asks for its virus databases to be updated, do so immediately. Likewise, when
it alerts you to a suspicious file and offers to delete it or quarantine it,
carry out the operation as soon as possible.
In addition, some best practices are in order when using
external storage devices, such as USB keys or external hard drives:
Never use unknown or abandoned service or equipment.
Assign a specific use to each USB key to reduce the effects of
possible contamination.
Encrypt the contents of your storage devices to prevent
hackers.
5. Avoid
public or unknown WiFi networks
While they can be very useful, public WiFi networks are a boon
for hackers. Very easy to access, these networks can be controlled by
cybercriminals to intercept your personal information.
Here are some tips to avoid connecting to these networks or,
if you do, use them securely:
To prevent your devices from automatically connecting to these
networks, turn off wireless connections (WiFi, Bluetooth, NFC, etc.) when you
are not using them.
When you can, choose the private 3G or 4G connection associated
with your mobile subscription. And don't forget to secure the connection
sharing of your devices with a password: this will prevent anyone from having
direct access to your shared data!
If you have no other choice but to use public Wi-Fi, make sure
you never carry out any sensitive transactions (payment by credit card, tax
declaration, requesting confidential information, etc.) and if possible use a
virtual private network (VPN).
6.
Digital security: Separate professional and personal uses
With the proliferation of Internet access, your personal and
professional information becomes accessible from anywhere. It becomes possible
to:
Check your professional emails in your living room.
Take a look at your social networks during a coffee break at
the office.
Reread an important contract on the train then watch a sports
broadcast.
Thus, with the Internet, the border between professional and
personal life is becoming more and more porous. To best secure your digital
uses in these different environments, start by using a different password for
each professional and personal service to which you have access.
Also distinguish your uses on social networks:
Avoid sharing business information on your personal social
networks. Sharing and interpreting information can quickly hurt your business.
Conversely, you probably don't want your business to know
about everything you post in your private circle.
The same goes for e-mail and online storage services. Don't mix up your messages and use separate cloud services to store your business and personal data - without it you risk a wrong recipient at best and at worst endanger your business and find yourself legally responsible of the situation.
7. Avoid
browsing questionable or illegal sites and be vigilant when downloading a file
In general, avoid going to questionable or illegal sites. Some
are likely to harbor counterfeits and may contain viruses. Do not use unofficial
platforms or download files from illegal download sites: many files are
infected and may contain viruses and other malware. Some pornographic sites are
also virus nests, be careful.
To download new applications to your computer, tablet or
smartphone, we recommend that you only use official stores or the site of the
application itself.
8.
Control the permissions of user accounts
The same workstation, server or software can be accessed by
several users, each with more or less restricted access depending on their
permission level.
When it comes to adding users to a device or service, and
therefore choosing the level of permission to grant them, always apply the rule
of minimum privilege: make sure that each user has only the permissions they have
need.
This simple principle limits the damaging consequences in the
event of an attack and considerably increases your digital security.
How to do?
By default, all users of a workstation or server must have a
limited level of access to the operating system and information.
Then, customize as much as possible the attributions and
possibilities of each one according to his needs.
Finally, keep an eye on each account and its use.
9.
Digital security: Be vigilant about links or attachments in e-mail messages
Phishing (or phishing English) defines a criminal technique of
impersonating a known organization (bank, operators, etc.) or relative to collect
confidential information.
Here are some simple recommendations to avoid it:
Do not share personal or business information by messaging or
over the phone.
If you receive a message containing a link, position the mouse
cursor (without clicking) on this link to display the address to which it
actually points.
Double check the website address before entering any data. If
this does not correspond exactly to the site concerned, it is most likely a
fraudulent site.
If the site allows it, activate two- factor authentication to
secure your access.
Use different and complex passwords for each site and
application.
Enter the address of the site concerned directly in your
browser.
If in doubt, contact the organization directly to confirm the
message or call you have received. If you provided banking information, oppose
your cards and file a complaint.
10. Pay
attention to personal or professional information that is disseminated on the
Internet
In general, everyone should feel responsible for what they
post on the internet. Never communicate sensitive information on sites which
seem to you insufficiently protected and never when the mention “Not secure”
appears on the left of the address of the Internet site.
Likewise, be careful to identify the people with whom you
speak on the Internet. If you are in doubt about an identity, for example
because of an unusual way of writing, contact that person via another means before
answering any questions.
Finally, always be vigilant: even your friends or contacts can
send or share malicious content to you, unintentionally.
With these 10 digital security rules in mind, you are better protected to surf
the Internet peacefully!
Comments
Post a Comment