Twenty Cybersecurity Tips For Living Quieter

Although complete immunity against these attacks does not exist, it never hurts to repeat a series of notes, at least to ensure that we are not caught off guard again:

  • Make periodic backups of your data, and often check that the backup copies are restored correctly
  • Keep the operating system up to date and create recovery points on your computers
  • Use legal software and install patches and updates that are released
  • Acquire a reliable security solution
  • Install some anti-ransom tool, which blocks the encryption process
  • Use secure browsers that block Javascript code
  • Keep the firewall correctly configured, to allow access only to the necessary websites, applications, and services
  • Do not use accounts with administrator privileges in common tasks
  • Have an antispam that prevents infection through massive email campaigns and never open unknown attachments
  • It shows the hidden extensions of the files because, in most cases, the malware is hidden in an executable. Disable files that run from the AppData and LocalAppData folders
  • Disable RDP if you don’t use it
  • Create access control lists to protect network mapped drives
  • It blocks the traffic of the domains and command and control servers through an IDS / IPS3, to avoid communication between the malware and the C2 server
  • Use virtual machines to isolate the host system
  • Establishes DRP protocols and infrastructure (Disaster Recovery Plan)
  • Hire specialized insurance to alleviate economic losses
  • Train your employees with basic safety notions, since many times, and they represent the weakest link in the chain

If, in spite of everything, you cannot avoid the infection, do not pay the extortionists. Nothing and nobody guarantees that you will recover your data.

A Professional Email Is Professional, Not Personal

It may seem silly, but there are few workers who use their personal email to register in forums, e-commerces, other websites, etc. These are pages that everyone – including dockers – can access. It’s easy for you to end up on a spam list that can include dangerous files. They should not use professional mail outside of work or respond to emails from unknown or suspicious senders and beware of phishing, those emails that pretend to be from a known sender but are not authentic.

Storage Online Or On Own Servers

Hard drives are lost or broken, laptops may disappear, the same goes for a USB, and we will not do the backup on the same computer as the original. The information will be stored in the cloud or on the company’s own servers so that they are safe from cyber-attacks. Of course, we will always use professional accounts, not personal ones, and we will access the services from protected computers and secure connections, and, of course, we will use secure passwords.

Secure Passwords

Neither 1234 nor our date of birth nor a combination impossible to remember that we have pointed in a post attached to the monitor or the same that we have in our personal account. When the automatic password for a worker is generated, it must be changed to reinforce security. A password that remembers it, or if it indicates that it is in a place of difficult access. Needless to say, he will not give it to anyone, not even to those presumed technicians of the company or the computer provider who ask for it over the phone. They can access your account without giving them the password.

Ten Cybersecurity Tips For Companies

It is impossible to reduce the risk of cyberattacks to zero. That is why companies must take security measures to make it more difficult for them to suffer some kind of digital attack.

Train Employees

In terms of cybersecurity for companies, it is essential to provide training to employees since, in most cases, they are responsible for digital intrusions. Teaching employees basic notions of security, such as not writing down their passwords, not using them for business and personal accounts, helps to strengthen the digital security of the company.

Use Complicated Passwords

Globally, 10% of citizens use the same password for everything. In 2018, the most used passwords were “123456”, “password,” and “123456789”.

The use of this type of passwords is a gift for hackers who want to obtain private data. Therefore, cybersecurity organizations recommend looking for passwords that are difficult to guess by bots and by close people. So it is very important not to create passwords that have personal information or are numerical or alphabetic patterns.

Use Various Authentication Methods

As we have already seen, passwords are not entirely secure. That is why using several authentication methods will shield your data more. Some email services already use these functions, such as sending a password to the mobile phone every time you log in after you have included the password.

Establish Secure Communications By Email

As we have said before, email is one of the weak points of digital security and is the cause of almost half of the attacks. In addition to not opening attachments from strangers, it is important to obtain a tool that encrypts messages to prevent them from being intercepted.

One of the most popular cases of cyberattacks occurred in 2017. The ransomware known to WannaCry affected more than 150 countries and some 1,200 teams. Something that could have been avoided, since Windows released an update months before patching this vulnerability, which brings us to the next tip.

Keep The Software Updated

The hackers are always looking for vulnerable systems. That is why it is very important to keep the software updated to obtain patches for vulnerabilities that may exist in the system and thus protect sensitive information.

Always Log Out

When you finish using an account, it is very important to log out, since this prevents sensitive data from being stolen or downloaded by third parties. This advice is very important, especially when you log in to a computer that is not the usual one.

HTTP Protocol On The Web Page

Some time ago, we already explained what an SSL / TLS certificate is. The web pages that have this certificate encrypt the personal information that is entered in these pages, making it very difficult for them to be attacked by intruders. On the other hand, the SSL / TLS security certificate helps to prevent web visitors from being scammed through phishing.

Make a Security Copy

Creating a backup is one of the ways to make sure you have important data safe in case of an attack or loss of these. Backups should be made periodically and stored in different places to prevent hackers from accessing them.

Use Antivirus And Firewall

Having an antivirus and a firewall is an extra help to avoid suffering a cyberattack. With the help of this type of software, you will be able to protect the information, and it will make it a little more difficult for hackers since it will notify you of malicious programs and pages.

Do Not Install Unknown Programs

To avoid malware, antivirus is one of the best options, but above all, you have to be very careful when browsing pages without a security certificate and when downloading files from sources that are unreliable or unknown.…

Single Column Posts

Single Column Posts Subtitle

The Eight Most Relevant Software Trends For 2019

At the end of the year, we have to review everything that is to come in terms of ERP Software...

Five Key Technologies That Will Reduce The Strain On Privacy

A study by the World Economic Forum identifies a series of new technologies that banks and other institutions can implement...

Five Technologies That Will Surprise You In 2020

Constant change and innovation without limits have been part of our reality during the last decades. And it has become...

Twenty Cybersecurity Tips For Living Quieter

Although complete immunity against these attacks does not exist, it never hurts to repeat a series of notes, at least...

Ten Cybersecurity Tips For Companies

It is impossible to reduce the risk of cyberattacks to zero. That is why companies must take security measures to...