Skip to main content

The 10 golden rules of cyber security


Respect them and you will always be safe!

In this blog I speak very often about computer security , since for me it is a fundamental aspect.

Over time, during my experience as an entrepreneur, I have often found some common shortcomings  from my customers: those who used poor passwords, those who did not update the antivirus, etc. etc.
Therefore, because I want to help you protect your company, I decided to give my, very personal , 10 golden rules of IT security: follow them and you can work safe!

Let's not waste any more time and let's see them immediately!

 The 10 golden rules of cyber security

Come on, let's get started!

1. Beware of public Wi-Fi connections

It is true, it does not really concern companies, but you will surely have happened to connect to a wifi network of some hotel, restaurant, camping, etc. which on your smartphone was registered as "public" .

The risk of these networks is that anyone can connect and therefore hackers as well . These can control your browsing data (what site you are on, where you were before) and even sneak into your connected devices .

Obviously for the purpose of stealing your personal and business data !

A good tip to stay protected is NOT to make payments and NOT to surf social media. This way hackers won't have access to your sensitive data .


2. Attention to attachments

A timeless classic. I have talked about it in other articles but it is always good to remember it. Beware of what you download , especially email attachments.

You never know if it is infected or not (even if it comes from an acquaintance of ours), therefore a good habit is to scan the file before downloading it.

It costs nothing , takes very little time and prevents all your business IT from being compromised.
So yes, the consequences will cost you dearly!

3. Pay attention to what you share on social media

Here too, simple common sense. But that is always better to emphasize. DO NOT share too  personal information  or sensitive data about your company.
It doesn't interest people and it's not safe for YOU .

4. Activate 2-step verification

This system works that, the site you are trying to access, after having asked us for your username and password, will send you a message with a  unique code, to  be entered.

It is a practical and effective system . Because?

Because not only a hacker, to try to scam you, should know all the access data but also have your mobile phone , in order to receive the message with the code.
It is one of the safest forms of protection in the world , in fact it is widely used by all online banks and large e-commerce ; that is, where your payment information is also stored (cards, documents ...).

You can understand how effective it is.

5. Manage access to corporate devices

In other words, keep an eye on who and how they have access to your corporate network.
Make sure that your collaborators can access, but only in specific and useful areas, and always give yourself the possibility of being able to cancel the access of those who no longer work with you.
Make sure that the passwords are always up- to- date and effective (see point 10) and that they are not written on flying sheets or, worse, on some not recommendable site.

Remember that every access point to your network is a potential weakness!

6. Train and train your collaborators

Resuming your previous point, your collaborators may not know that some of their habits is harmful to the company and, therefore, you must teach them yourself.

Check their preparation on the topic and plan refresher courses or take time to explain the importance of computer security and how they are involved in it.

But first of all, you must train yourself on the subject. So you know what's going on and what isn't.
Spend time every week on your company safety training

7. Backups are critical

On this topic I have already talked about it for a long time in dedicated articles so I avoid wasting time and I send you directly there ( click on the title and you will be sent back to the  UAE Technician blog article ):

The backup, the salvation for our data ;

The ultimate guide to effective backup ;

Because automation is a great help ( you will find advice on how to organize your backup ):

8. Protect yourself with firewalls

The corporate firewalls play an important role in security, since they prevent access to unauthorized devices and any intrusion attempts "forced" ( ie hacking ).
It is important to have them in the company and that they are correctly set up because, believe me, they will solve you many problems.
Even just because hackers might decide that it is not worth "wasting time" with you that you are security conscious and therefore looking for someone else who is not so prepared.

9. Attention to remote work

Although remote working is a great convenience for you and your employees, it could  be a problem with regards to IT security  .

Being that a computer is accessing corporate data from outside your building (remotely, in fact) - you have no control over its network (home or public, most likely).

What you can do is to work on the access device : you can talk to a technician and ask him to set the software for security on the laptop / smartphone of your employee (or yours).
So you don't have to worry even if you log in outside your company.

10. Establish rules of conduct for passwords

By rules of behavior I mean all those "good habits" to follow in the password field. For example the main ones are:
Periodically update them ( 60-90 days );
To expect a certain standard ( at least 8 characters, upper and lower case, special characters );
Store them safely ;
Do not share them with anyone, not even with colleagues (everyone has their credentials);
To each his own username & password;
Check that everyone respects the rules .
You can start from this list to better manage all the passwords in the company and how your collaborators behave.
If everyone, in their small way, is careful about what they do ... you can feel comfortable!

b. Conclusion

We have come to the end of this article. Today we saw the 10 golden rules of cyber security . Write them on a post-it note, on a sheet of paper or carry them in your wallet ... but above all
Never forget them!


Life as an entrepreneur is very complex and these simple 10 rules will help you "simplify" it, even if only for safety!
Finally, I remind you that on the  UAE Technician blog  you can find other articles like this,  useful  and  totally free  on the world of corporate IT  and on the world of IT Cyber security Services in Dubai .


Comments

  1. Thanks for a very interesting blog. What else may I get that kind of info written in such a perfect approach? I’ve a undertaking that I am simply now operating on, and I have been at the look out for such info. Phishing Testing

    ReplyDelete

Post a Comment

Popular posts from this blog

7 Most Important Tips to Create the Best Medical Web Design in Australia

The website design is simple for other forms of websites, it becomes quite difficult when it comes to healthcare. It generally occurs due to the difference between healthcare website design strategies and the expectation of users. Users don’t get convinced when they don’t find what they expect to see on healthcare websites. Bad web design is the only reason for the dissatisfaction of website visitors. Thus, follow this article if you are looking for the best medical web design for your organization in Australia. Importance of Engaging in Web Designs for Medical Background: If you are running a healthcare organization, then you must consider the following key points before designing your website. The major group of healthcare marketing executives perceives an appealing website as the primary driver of their business.  More than 50% of people search for medical providers online before engaging with healthcare services.  Whereas, approximately 81% of people remain discontent

7 Reasons You Should Redesign Your Small Business Website in WordPress

A website is the easiest and cheapest way of reaching the target audience at a global level. A website displays the products and services on behalf of your business. Moreover, you can come to know the persons who are visiting your website. You can even modify your website based on the feedback of visitors and make it more user-friendly. Web Development services can be expensive for small firms. Thus, they can incorporate WordPress that offers affordable web solutions. Now, you might ask how to improve an existing website. WordPress allows users to redesign their current websites for a better experience. So, if you are willing to redesign your small business website in Dubai, then find a WordPress web developer who possesses enough experience in this field.    Know the 7 Reasons for Redesigning Your Small Business Website in WordPress: WordPress is beneficial for small business websites in the following aspects: 1 . Open Source WordPress is an open-source in the sense

Include Effective MailChimp Landing Pages to your Brand to Promote your Business

MailChimp is a popular e-commerce platform that is very helpful to find new potential customers and boosts your sales through deeper customer insights. Moreover, you can put your audience first through this interface without compromising the business growth. This valuable marketing platform has enough capability to bring your brand to life by introducing the elegant landing pages with multiple templates. To handle the landing pages templates need to be considered according to your business types. Moreover, you can follow this article to get several MailChimp landing page examples. 5 Great Landing Page Templates to Improve the Business  Platform Effectively There are a lot of Mailchimp landing pages and the design are varied due to the template design. Here, we are going to explain the MailChimp landing page example that helps you to grow your business successfully. Bandmates The Bandmates template under the Mailchimp landing page helps the users to build new networking opp