• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Cyber Security Solutions, Compliance, and Consulting Services - IT Security

We offer It security management, data, network, & Information security services for protecting information & mitigating security risks to your organization.

  • Home
  • About Us
  • Solutions & Services
    • Security Governance
    • NETWORK SECURITY
    • CLOUD SECURITY
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

Cyber Security Top Ten Tips

By infoguard | At January 4, 2014

January 4, 2014

Cyber Security Top Ten Tips

October is national “Cyber Security Awareness Month.” The theme is “Cyber Security is our Shared Responsibility” and that message has never been more appropriate. While there are many steps that people can take to be safe online, the following is a list of ten things you can do to secure your information.

1) Passwords: Use strong passwords to secure your information. Passwords should have at least eight characters and include uppercase and lowercase letters, numerals and special characters. It is important to keep different passwords for different accounts. This will reduce the chances that if one password fails your other accounts will be vulnerable as well. Do not use the same passwords for accessing work systems on any other accounts.

2) Use of External Devices: Many organizations have policies that limit the use of external devices (computers or devices such as thumb drives, smartphones and mobile devices that are not the property of the organization). These policies are intended to protect the overall system, and we urge you to follow your organization’s policies. As a home user it is important to be cautious about devices that don’t belong to you that you let connect to your equipment, as you cannot be sure that they are properly protected.

3) Phishing and Social Engineering: Phishing is a tactic to obtain your personal data, such as credit card numbers, passwords, account data, or other information. The scam typically attempts to entice email recipients into clicking on a link or opening an attachment that results in malware being downloaded onto your computer. While it may be difficult to spot some phishing attempts it’s important to be cautious about all communications you receive, including those purported to be from “trusted entities” and be careful when clicking on links or attachments contained within those messages. Additionally, do not respond to any unsolicited emails and do not open attachments contained in those messages.

4) Online transactions: Only shop at sites for companies you are familiar with and trust. When shopping online, look for the lock symbol or https in the website url to indicate the transactions are secure. Be wary of potential scams—if it sounds too good to be true, it probably is. Do not use a public computer or public wireless. Additionally you should make payments by using a credit card rather than a debit card, as credit cards are protected by the Fair Credit Billing Act and may reduce your liability if your information was used improperly.

5) Admin vs. Non-Admin accounts: Administrator or “Admin” accounts have more control over programs and settings for your computer. Hackers can potentially take control of your computer by accessing these accounts. Non-Administrator accounts, or guest accounts can still use programs, but limit the ability to make changes that hackers need to harm your computer. It is important to change the default password on your Admin accounts and to always run your computer as a non-administrator or non-admin unless otherwise needed.

6) Updating your systems and software: It is important to keep your systems and software up-to-date. System and software vendors often find vulnerabilities that they fix in the latest update. If your computer is not updated, then you are leaving it open to attack via these vulnerabilities. Set programs and systems to auto-update to avoid missing a critical update. This includes your operating system, office suite, Adobe, media players, browsers, and other programs that can access the Internet.

7) Protecting and securing mobile devices: It is important to make sure you secure your portable devices to protect both the device and the information contained on the device. Establish a password and enable screen lock or auto lock on all devices. If your device has Bluetooth functionality and it’s not

Resources for more information:
DHS Cyber Security: dhs.gov/files/cybersecurity.shtm
National Cyber Security Alliance: Staysafeonline.org
For more monthly cyber security newsletter tips, visit: www.InfoGuardSecurity.com

The information provided in the Monthly Security Tips Newsletters is intended to increase the security awareness of an organization’s end users and to help them behave in a more secure manner within their work environment. While some of the tips may relate to maintaining a home computer, the increased awareness is intended to help improve the organization’s overall cyber security posture. This is especially critical if employees access their work network from their home computer.

Filed Under: Uncategorized

Primary Sidebar

Archives

  • [+]Cloud security (17)
  • [+]Compliance (14)
  • [+]Cyber security news (101)
  • [+]Cyber security threats (258)
  • [+]Cyber security tips (239)
  • [+]E-Commerce cyber security (3)
  • [+]Enterprise cyber security (2)
  • [+]Financial organizations cyber security (2)
  • [+]General (22)
  • [+]Government cyber security (2)
  • [+]Healthcare cyber security (7)
  • [+]Law Firms Cyber Security (5)
  • [+]Network security (5)
  • [+]Newsletter (1)
  • [+]Ransomware (10)
  • [+]Risk assessment and management (5)
  • [+]Security management and governance (4)
  • [+]Supply Chain Attacks (2)
  • [+]System security (3)
  • [—]Uncategorized (14)
    • 5 Methods to Make Customer Experience Safer
    • Cloud Service Providers Risk Management: 50+ Contracts Key Components
    • Cloud Service Providers Risk Management: Contract Management
    • Cloud Service Providers Risk Management: Importance of Identifying Challenges Early
    • Cloud Service Providers Risk Management: Service Level Agreement (SLA)
    • Cloud Service Providers Risk Management: Understanding Your Risk Exposure
    • Common Types of Phishing Attacks
    • Cyber Security Top Ten Tips
    • How hackers are using COVID-19 to find new victims
    • Protect Yourself from Email Tax Scams
    • Tips For Secure Shopping Online
    • Top Four Cybersecurity Threats Faced by the Financial Services Sector
    • Unsecure Server Compromises 350 Million Emails
    • Using WiFi-Connect With Care
  • [+]Vendor security (10)

Footer

Infoguard Cyber Security

San Jose Office
333 W. Santa Clara Street
Suite 920
San Jose, CA 95113
Ph: (855) 444-6004

Irvine Office
19800 MacArthur Blvd.
Suite 300
Irvine, CA 92612

Recent Posts

  • Cybsersecurity in the Metaverse
  • How to Integrate AI into Your Cybersecurity Strategy
  • Cybersecurity Governance in the Age of Remote Work: Balancing Security and Productivity

Get Social

  • LinkedIn
  • Home
  • About Us
  • Solutions & Services
  • COMPLIANCE
  • SECTORS
  • Blog
  • CONTACT

Copyright © 2023