Respect them and you
will always be safe!
In this blog I speak
very often about computer security , since for me it is a fundamental aspect.
Over time, during my experience as an entrepreneur, I have
often found some common shortcomings
from my customers: those who used poor passwords, those who did not
update the antivirus, etc. etc.
Therefore, because I want to help you protect your company,
I decided to give my, very personal , 10 golden rules of IT security: follow
them and you can work safe!
Let's not waste any more time and let's see them
immediately!
The 10 golden rules of cyber security
Come on, let's get started!
1. Beware of public
Wi-Fi connections
It is true, it does not really concern companies, but you
will surely have happened to connect to a wifi network of some hotel,
restaurant, camping, etc. which on your smartphone was registered as
"public" .
The risk of these networks is that anyone can connect and
therefore hackers as well . These can control your browsing data (what site you
are on, where you were before) and even sneak into your connected devices .
Obviously for the purpose of stealing your personal and
business data !
A good tip to stay protected is NOT to make payments and NOT
to surf social media. This way hackers won't have access to your sensitive data
.
Read Also: Data Backup Services
Dubai
2. Attention to
attachments
A timeless classic. I have talked about it in other articles
but it is always good to remember it. Beware of what you download , especially
email attachments.
You never know if it is infected or not (even if it comes
from an acquaintance of ours), therefore a good habit is to scan the file
before downloading it.
It costs nothing , takes very little time and prevents all
your business IT from being compromised.
So yes, the consequences will cost you dearly!
3. Pay attention to
what you share on social media
Here too, simple common sense. But that is always better to
emphasize. DO NOT share too personal
information or sensitive data about your
company.
It doesn't interest people and it's not safe for YOU .
4. Activate 2-step
verification
This system works that, the site you are trying to access,
after having asked us for your username and password, will send you a message
with a unique code, to be entered.
It is a practical and
effective system . Because?
Because not only a hacker, to try to scam you, should know
all the access data but also have your mobile phone , in order to receive the
message with the code.
It is one of the safest forms of protection in the world ,
in fact it is widely used by all online banks and large e-commerce ; that is,
where your payment information is also stored (cards, documents ...).
You can understand how effective it is.
5. Manage access to
corporate devices
In other words, keep an eye on who and how they have access
to your corporate network.
Make sure that your collaborators can access, but only in
specific and useful areas, and always give yourself the possibility of being
able to cancel the access of those who no longer work with you.
Make sure that the passwords are always up- to- date and effective
(see point 10) and that they are not written on flying sheets or, worse, on
some not recommendable site.
Remember that every access point to your network is a
potential weakness!
6. Train and train
your collaborators
Resuming your previous point, your collaborators may not
know that some of their habits is harmful to the company and, therefore, you
must teach them yourself.
Check their preparation on the topic and plan refresher
courses or take time to explain the importance of computer security and how
they are involved in it.
But first of all, you must train yourself on the subject. So
you know what's going on and what isn't.
Spend time every week on your company safety training
7. Backups are
critical
On this topic I have already talked about it for a long time
in dedicated articles so I avoid wasting time and I send you directly there (
click on the title and you will be sent back to the UAE
Technician blog article ):
The backup, the salvation for our data ;
The ultimate guide to effective backup ;
Because automation is a great help ( you will find advice on
how to organize your backup ):
8. Protect yourself
with firewalls
The corporate firewalls play an important role in security,
since they prevent access to unauthorized devices and any intrusion attempts
"forced" ( ie hacking ).
It is important to have them in the company and that they
are correctly set up because, believe me, they will solve you many problems.
Even just because hackers might decide that it is not worth
"wasting time" with you that you are security conscious and therefore
looking for someone else who is not so prepared.
9. Attention to
remote work
Although remote working is a great convenience for you and
your employees, it could be a problem
with regards to IT security .
Being that a computer is accessing corporate data from
outside your building (remotely, in fact) - you have no control over its
network (home or public, most likely).
What you can do is to work on the access device : you can
talk to a technician and ask him to set the software for security on the laptop
/ smartphone of your employee (or yours).
So you don't have to worry even if you log in outside your
company.
10. Establish rules
of conduct for passwords
By rules of behavior I mean all those "good
habits" to follow in the password field. For example the main ones are:
Periodically update them ( 60-90 days );
To expect a certain standard ( at least 8 characters, upper
and lower case, special characters );
Store them safely ;
Do not share them with anyone, not even with colleagues
(everyone has their credentials);
To each his own username & password;
Check that everyone respects the rules .
You can start from this list to better manage all the
passwords in the company and how your collaborators behave.
If everyone, in their small way, is careful about what they
do ... you can feel comfortable!
b. Conclusion
We have come to the end of this article. Today we saw the 10
golden rules of cyber security . Write them on a post-it note, on a sheet of
paper or carry them in your wallet ... but above all
Never forget them!
Life as an entrepreneur is very complex and these simple 10
rules will help you "simplify" it, even if only for safety!
Finally, I remind you that on the UAE Technician blog you can find other articles like this, useful
and totally free on the world of corporate IT and on the world of IT Cyber
security Services in Dubai .
Thanks for a very interesting blog. What else may I get that kind of info written in such a perfect approach? I’ve a undertaking that I am simply now operating on, and I have been at the look out for such info. Phishing Testing
ReplyDelete