KEEP SOFTWARE UP-TO-DATE
Ensure your software across all machines are up-to-date to stay in line with security features to fend off security vulnerabilities.
DO NOT OPEN THAT E-MAIL!
Not all e-mails should be opened, even if they may be legitimate. If an e-mail looks fake or dodgy, do not open it!
KEEP YOUR HARDWARE UP-TO-DATE
Similar to software, hardware needs to be up-to-date. Old hardware is slower to respond to cyber-attacks if they occur. It’s time to move to newer hardware.
USE ANTI-VIRUS AND ANTI-MALWARE
Connection to the web exposes you to risks. This is unavoidable. However, you can reduce your vulnerability by ensuring anti-virus and anti-malware are installed on your computers.
USE VPNS FOR ALL INTENTS AND PURPOSES
Use a virtual private network (VPN) for a more secure and privatised network. This will encrypt your connection and protect your private information.
CHECK THOSE LINKS BEFORE YOU CLICK
Similar to e-mails, if something appears dodgy or fuzzy about a hyperlink, it is best to err on the side of safety. Use your web browsers to see the target URL by hovering over the link.
Do this to check links before you click on the suspect link
DON’T BE LAZY WITH YOUR PASSWORDS!
Passwords must be complex, and it’s best to have a policy with multiple characters and structure and at the very least a 14-string multiple characters, with a minimum of changes at least every two-weeks. This must be enforced and is good behaviour. Failure to have this in place can be construed as poor diligence, and losses may not be covered by insurance.
DISABLE BLUETOOTH WHEN NOT REQUIRED
Bluetooth is practical; however, you are at risk when connected, as you will be online.
ENABLE 2-FACTOR AUTHENTICATION
Most platforms support two-factor authentication to keep your accounts more secure. It’s an additional layer that verifies the user, not an unauthorised person. The possible irritation is acceptable for security.
REMOVE ADWARE FROM YOUR MACHINES
Adware collects information about you to serve you more targeted ads. It’s best to rid your computer of all forms of adware to maintain your privacy. Just search for malware removers, and you will find some very suitable ones.
Look FOR HTTPS ON WEBSITES
When you’re on a website that isn’t using HTTPS, there’s no guarantee that the transfer of information between you and the site’s server is secure. Ensure the site uses HTTPS [before www.] before providing personal or private information.
DON’T STORE IMPORTANT INFORMATION IN NON-SECURE PLACES
To store information online requires a safe location that unauthorised users cannot access.
SCAN EXTERNAL STORAGE DEVICES FOR VIRUSES
External storage devices are susceptible to malware as internal storage devices on your PC. If you always scan external devices for malware before accessing them, as this can infect the entire network.
AVOID USING PUBLIC NETWORKS
Public networks are convenient; however, the risk is that you are sharing the network with everyone else. Any information you process on the network is vulnerable. Stay away from public networks or use a VPN when you’re connected to one.
Training employees is key for cybersecurity. A single lapse can affect the entire organisation and its network.