Tuesdays Top Tips

Apr 13, 2020

An archive of JC Cyber Security's #TuesdaysTopTips

Tip #1 - You are a target to hackers.

Hackers are always on the look out for vulnerable systems to attack and cause a business to fall over. Don't ever say "It won't happen to me" or "I won't get hacked" because the chances are you will. In fact, last years statistics show that 64% of SME's were breached. If you think hackers won't attack because you're a small business, then you're wrong! We are all at risk and the consequences are high - to your

personal and financial well-being, and to your businesses standing and reputation. You MUST ensure that your systems are as secure as possible.


Tip #2 - Keep software up to date.

Installing software updates for your operating system and programs is CRITICAL . Always install the latest security updates for your devices:

•    Turn on Automatic Updates for your operating system.

•    Ensure all of your applications and programs are kept up to date. When an update is available, install it.

•    Use web browsers such as Chrome or Firefox that receive frequent, automatic security updates.

•    Make sure to keep browser plug-ins (Flash, Java, etc.) up to date.


Tip #3 - Avoid Phishing scams - beware of suspicious emails and phone calls.
Phishing scams are a constant threat - using various social engineering techniques, cyber criminals will attempt to trick you into divulging personal information such as your login ID and password, banking or credit card information.

 

  • Phishing scams can be carried out by phone, text, or through social networking sites - but most commonly by email.
  • Be suspicious of any official looking email message or phone call that asks for personal or financial information.

 

Tip #4 - Practice good password management.

We all have too many passwords to manage - and it's easy to take short-cuts, like reusing the same password.  A password management program can help you to maintain strong unique passwords for all of your accounts.  These programs can generate strong passwords for you, enter credentials automatically, and remind you to update your passwords periodically.


There are several online password management services that offer free versions, and one that we highly recommend is
LastPass - a free application compatible with most, if not all, devices.


Here are some general password tips to keep in mind - if you choose to use LastPass, it will cover all these tips:

 

  • Use long passwords - 20 characters or more is recommended.
  • Use a strong mix of characters, and never use the same password for multiple sites.
  • Don't share your passwords and don't write them down (especially not on a post-it note attached to your monitor).
  • Update your passwords periodically, at least once every 6 months (90 days is better).

 

If you are interested in LastPass and would like some tips and guidance, feel free to contact us!


Tip #5 - Be careful what you click.
Avoid visiting unknown websites or downloading software from untrusted sources.  These sites often host malware that will automatically, and often silently, compromise your computer.


If attachments or links in the email are unexpected or suspicious for any reason, don't click on it. Especially during these unprecedented times, it is more vital that you are on the look out for suspicious emails. If you have any worries about suspicious emails, let us know and we can provide an email address for you to forward the email onto us so we can look into it. Moreover, if you have clicked on a link that you believe to be malicious give us a call and we can scan your machine for any malware.


Tip #6 - Never leave devices unattended
The physical security of your devices is just as important as their technical security.

  • If you need to leave your laptop, phone, or tablet for any length of time - lock it so no one else can use it.
  • If you keep sensitive information on a flash drive or external hard drive, make sure to encrypt these and lock it with a password. 
  • For desktop computers, shut-down the system when not in use - or lock your screen.

 


Tip #7 - Use mobile devices safely
Considering how much we rely on our mobile devices, and how susceptible they are to attack, you'll want to make sure you are protected:

  • Lock your device with a PIN or password - and never leave it unprotected in public.
  • Only install apps from trusted sources.
  • Keep your device's operating system updated.
  • Don't click on links or attachments from unsolicited emails or texts.
  • Avoid transmitting or storing personal information on the device.
  • Most handheld devices are capable of employing data encryption - consult your device's documentation for available options.
  • Use Apple's Find my iPhone or the Android Device Manager tools to help manage the impact of loss or theft.
  • Backup your data.

 


Tip #8 - Install Anti-Virus Protection

Only install an anti-virus program from a known and trusted source.  Keep virus definitions, engines and software up to date to ensure your anti-virus program remains effective.
Through our
Protection Plan , we can take the worry of endpoint protection away by fully managing this service for you.


Every Tuesday a new tip will be added. By following these tips and remaining vigilant, you are doing your part to protect yourself and others.


Follow Us

Be the first to know

You might also like

08 Apr, 2024
‘Hacking’ refers to activities performed by a threat actor (a ‘hacker’) that seeks to compromise digital services, such as computers, smartphones, and networks. Hackers are usually characterised as only being unlawful, motivated by financial gain, information gathering, or even just for the thrill of having a challenge.
Different Penetration Testing Types
01 Apr, 2024
Penetration testing is a form of an ethical hacking simulation conducted in accordance with industry guidelines, which aims to closely mimic real-world targeted attacks that organisations face daily. By actively testing your organisation’s defences, you can understand your security posture while also improving your defences, reducing the likelihood of experiencing a cyber-attack, ensuring confidentiality, integrity, and availability
What is Penetration Testing?
25 Mar, 2024
A penetration test ultimately seeks to answer the question “How effective is my organisation’s security controls against a skilled human hacker?” while determining the security posture of your organisation.
More Posts
Share by: