CYBERGUIDE REFRESHER

KEEP SOFTWARE UP-TO-DATE

Ensure your software across all machines are up-to-date to stay in line with security features to fend off security vulnerabilities.

DO NOT OPEN THAT E-MAIL!

Not all e-mails should be opened, even if they may be legitimate. If an e-mail looks fake or dodgy, do not open it!

KEEP YOUR HARDWARE UP-TO-DATE

Similar to software, hardware needs to be up-to-date. Old hardware is slower to respond to cyber-attacks if they occur. It’s time to move to newer hardware.

USE ANTI-VIRUS AND ANTI-MALWARE

Connection to the web exposes you to risks. This is unavoidable. However, you can reduce your vulnerability by ensuring anti-virus and anti-malware are installed on your computers.

USE VPNS FOR ALL INTENTS AND PURPOSES

Use a virtual private network (VPN) for a more secure and privatised network. This will encrypt your connection and protect your private information.

CHECK THOSE LINKS BEFORE YOU CLICK

Similar to e-mails, if something appears dodgy or fuzzy about a hyperlink, it is best to err on the side of safety. Use your web browsers to see the target URL by hovering over the link.

Do this to check links before you click on the suspect link

DON’T BE LAZY WITH YOUR PASSWORDS!

Passwords must be complex, and it’s best to have a policy with multiple characters and structure and at the very least a 14-string multiple characters, with a minimum of changes at least every two-weeks. This must be enforced and is good behaviour. Failure to have this in place can be construed as poor diligence, and losses may not be covered by insurance.

DISABLE BLUETOOTH WHEN NOT REQUIRED

Bluetooth is practical; however, you are at risk when connected, as you will be online.

ENABLE 2-FACTOR AUTHENTICATION

Most platforms support two-factor authentication to keep your accounts more secure. It’s an additional layer that verifies the user, not an unauthorised person. The possible irritation is acceptable for security.

REMOVE ADWARE FROM YOUR MACHINES

Adware collects information about you to serve you more targeted ads. It’s best to rid your computer of all forms of adware to maintain your privacy. Just search for malware removers, and you will find some very suitable ones.

Look FOR HTTPS ON WEBSITES

When you’re on a website that isn’t using HTTPS, there’s no guarantee that the transfer of information between you and the site’s server is secure. Ensure the site uses HTTPS [before www.] before providing personal or private information.

DON’T STORE IMPORTANT INFORMATION IN NON-SECURE PLACES

To store information online requires a safe location that unauthorised users cannot access.

SCAN EXTERNAL STORAGE DEVICES FOR VIRUSES

External storage devices are susceptible to malware as internal storage devices on your PC. If you always scan external devices for malware before accessing them, as this can infect the entire network.

AVOID USING PUBLIC NETWORKS

Public networks are convenient; however, the risk is that you are sharing the network with everyone else. Any information you process on the network is vulnerable. Stay away from public networks or use a VPN when you’re connected to one.

TRAINING EMPLOYEES

Training employees is key for cybersecurity. A single lapse can affect the entire organisation and its network.