Cybersecurity: 7 tips to protect yourself from cyber attacks

Cybersecurity: 7 tips to protect yourself from cyber attacks
Cybersecurity: 7 tips to protect yourself from cyber attacks

Protect yourself from cyber attacks by following some easy tasks. Cybersecurity refers to a variety of technologies, methods, and systems designed to protect networks within an organization. Cyber-crime is any crime that takes place online. Cybercriminals often commit crimes by targeting computer networks or devices.

Cybersecurity is an integral issue from all Internet-related activities. Network Solutions can be implemented within information systems to reduce risks. However, preventive actions should consider minimizing users’ margins of error.

“Cybercrime is the greatest threat to every company in the world.”— Ginni Rometty

These tips already make it possible to understand that the risk of malware on the web is everywhere. This article is not intended to create users anxious but to warn them that prudent use brings peace of mind to the protection of their information.

How to protect yourself from cyber attacks?

Take Regular Backups

How to protect yourself from cyber-attacks

One of the first principles of defense is to keep a copy of your data to be able to react to an attack, a malfunction, or theft/loss of equipment. Backing up your data is a condition for the continuity of your activity. It is the basis of computer security.

Why encrypt your data?

Good to know: There is a much greater chance that you even lose your equipment that you are the victim of theft. Indeed, the report Verizon ( DBIR ) on the flight data revealed in 2016, “an asset is lost 100 times more frequently than is stolen .” Full data encryption is then the solution to limit the damage.

Use Quality Passwords And Multiple Authentications (MFA)

Use Quality Passwords And Multiple Authentications

The computer password allows access to the computer and the data it contains. It is, therefore, essential to choose good passwords. That is to say difficult to find using automated tools and difficult to guess by a third person.

How to generate a secure password?

To generate a good password, we recommend encrypting a phrase or phrase that is easy to remember. Use numbers, upper / lower case, and special characters.

  • Example sentence : I am using a good password
  • Encrypted sentence : Jut1l1s31m2p @ ss32Q @ l1T &

The longer and more complex the sentence, the more difficult it will be to crack the password. But it remains essential to set up multiple authentications (MFA).

How do multiple authentications (MFA) work?

The MFA uses three distinct factors:

  • Knowledge: relying on passwords, security questions or personal information, it calls for individual memorization.
  • Possession: user verification by sending tokens or temporary codes by email, SMS.
  • Inherent factors: Biometric measurements of immutable characteristics of the user (fingerprint reader, facial recognition, iris, etc.)

Finally, we recommend using Google’s invisible captcha to limit connection attempts by a bot. As well as a blocking of the IP address in the event of a Brute Force attempt.

Use update operating system and software

Have an up-to-date operating system and software

Browser, antivirus, office automation, personal firewall, etc keep update. Most attacks attempt to use vulnerabilities in a computer (operating system or software vulnerabilities). In general, attackers search for computers whose software has not been updated in order to use the unpatched vulnerability and thus manage to break into them. This is why it is essential to update all your software in order to correct these flaws. Cybersecurity responds to cybercrime.

Disable ActiveX and JavaScript components by default

Disable ActiveX and JavaScript components by default

ActiveX or JavaScript components allow interesting functionalities, but they also present security risks that can go as far as the takeover by an intruder of a vulnerable machine. Despite the inconvenience that this can cause, it is advisable, as part of good cybersecurity practices, to deactivate their default interpretation and to choose to activate them only when necessary and if one considers being on a site of confidence.

Don’t click too fast on links

Don't click too fast on links

One of the classic attacks aimed at deceiving the Internet user to steal personal information, consists of inducing him to click on a link placed in a message. This link can be misleading and malicious.

In case of doubt, it is better to enter the site address yourself in the address bar of the browser.

Cybersecurity is controlling the distribution of personal information

Cyber ​​security is controlling the distribution of personal information

The Internet is not the place of anonymity, and the information that is left there instantly escapes!

In this context, a good practice is to never leave personal data in forums, never to enter personal and sensitive details (such as bank details) on sites that do not offer all the required guarantees (absence of https ). When in doubt, it is better to abstain.

How to protect your data outside the company?

Good to know: when you have to work outside your office, do not use public wifi. Prefer the use of a VPN (Virtual Personal Network).

Indeed, even if it is said to be secure, you cannot be sure that the connection is not not compromise. Finally, companies and establishments offering “free wifi” can absorb your browsing history and sensitive data. But beware! Even when using a VPN, limit the transfer of confidential information as much as possible.

Finally, apply a privacy filter on your screens (computer, tablet, and smartphone) to protect yourself from side glances.

Be vigilant before opening email attachments

Be vigilant before opening email attachments

They often peddle malicious code. One of the most effective methods of spreading malicious code is by using email attachments. To protect yourself , never open attachments with the following extensions: .pif (such as an attachment called photos.pif); .com ; .bat ; .exe ; . VBS ; .lnk .

Conversely, when you send files as email attachments, choose to send attachments in the most “inert” format possible, such as RTF or PDF, for example. It will limits the risk of information leaks.

Ensuring cybersecurity is not just the responsibility of the IT staff in a company. The entire workforce must be committed to building security measures. Creating a specific level of awareness for the whole organization staff is essential. Yes, there should be one pillar assigned on top to supervise, but everyone has to ensure security.

LEAVE A REPLY

Please enter your comment!
Please enter your name here