bandeau_logo_en01.jpg

bandeau_logo_en02.jpg

bandeau_logo_en03.jpg

bandeau_logo_en04.jpg

bandeau_logo_en05.jpg

You are here :   Home » Blog » Technology
    Print this page...
Sentence to think about :   The happiness that is experienced derives from the love that is given.   (Isabel Allende)

Shift Pharmacies

Blog - Technology

The 15 Cybersecurity Tips to Avoid 99% of Cyberattacks  -  by cronywell

The 15 Cybersecurity Tips to Avoid 99% of Cyberattacks

1. Have an antivirus program installed and always updated
antivirus.jpg

  • Either the most powerful on the market or, at the very least, a free one.
  • It will always be better to have the most basic, cheap, or free plan than to have nothing.
  • It is important to have the latest version of the program and, of course, to download and install it officially so that it does its job correctly.

2. Keep an eye out for fraudulent downloads and attachments

  • Be careful when downloading files from the Internet, especially those executables type ".exe", as they can contain malicious code and damage your computer.

  • Remember that you may also come across such threats in the form of an email attachment.
  • The basic advice is: If you find yourself in front of a file that you don't expect, from someone who doesn't belong or from an unknown source, don't open it and send it to the trash immediately.

3. Doubt about strange emails, phishing and spam

malware.jpg

  • As we said, email is one of the main entry routes for security threats. No one is exempt from receiving a suspicious message.
  • Therefore, in the event of any strange email, delete it and do not open or download the attachment. If it is really important, they will contact you again in another way.
  • Be especially suspicious that you are dealing with something abnormal if the email is poorly worded, you do not know the sender or the address is suspicious or incomplete, if it is written in a language that is not the one you usually communicate with that interlocutor, if you are asked for money by mail (even if the sender claims to be your bank),  etc.
  • If you end up landing on a website where you must enter your data, check first that it is https and that the link is correct. Otherwise, it could be phishing. Whenever you can, try to access that website directly from your browser and not after you have clicked on a link in an email or other suspicious source.

4. Always keep your operating system up to date
OS.jpg

  • This is very important to keep in mind because, just as malware is constantly evolving, your OS should also be updated at the same rate.
  • Updates to the operating system of your devices usually come with patches to solve technical problems or security gaps.

5. Manage your passwords well

  • They are also usually another of the great security breaches.

  • We can make several mistakes with passwords: from putting an easy one to decipher (year of birth, phone number, car license plate, 123456...), to putting the same password for all sites.
  • It is important to have a unique password for each site, which is robust with a multitude of characters and change it periodically.
  • You can also create passwords using random key generators (including numbers, symbols, uppercase and lowercase letters, etc.).
  • Finally, we recommend saving your password in a password manager that helps you have complex passwords without having to remember them.

 

6. Remember, your phone or tablet should also be protected and are as vulnerable as a computer

cel_tab.jpg

  • Don't overlook this aspect. Do we not use our mobile devices as much or more than a desktop or laptop computer?
  • We must bear in mind that our mobile or tablet can be victims of a virus and for this reason, we must take extreme precautions when we use them to browse the internet or make an online purchase.
  • Likewise, it is also advisable to install an antivirus system that guarantees secure payment and secure access to your online banking.

7. Use user creation for different people

  • If you share a computer with several people (in your home or work office) it is important that you create accounts of different users and configure the permissions according to the principle of need to know: that each user accesses where they really need and not everyone's.

  • With this, your personal data, browsing history, files, etc., will be reserved only for yourself. If another user's security is breached, your information will be better protected.
  • As is obvious, a different and secure password (with the instructions we have given you above) must also be configured for each user.

8. Activate the Firewall

  • It is one of the tools when it comes to protecting our device by default, it is available in all operating systems and is easy to configure, being able to choose the level of protection that each one wants at all times.

9. Always shop on safe sites

  • Online shopping can also be another way to enter security threats, as they can steal your data and money.
  • The tip: don't buy anything from an online store that you don't think you trust. Check that it is a certified and reliable place.
  • Pay attention to the SSL certificate of a website (represented by a padlock symbol in the navigation bar), and that the website from which you are going to make the purchase has an 'https' domain as is the case with https://www.midire.ar

10. A thousand eyes with IoT devices (Internet of Things = Internet of Things)

  • Speakers, Smart TVs, smart watches and bracelets... These devices, also known as wearables (if worn) or IoT devices (in general) can be susceptible to hacking, as there have already been cases of hacking, leaking and eavesdropping through them.
  • The advice is to always follow the manufacturer's instructions and update the system when necessary to prevent "weird stuff" from happening.
  • Innovation has positive things, but it is usually associated with greater risks since they have fewer security measures by default. Hence, in the most innovative companies or organizations, they need experts in IoT Cybersecurity.

11. Check the authorized apps and extensions

  • Be very careful with extensions such as "see who has unfollowed me" or Facebook games because, if you grant permissions to these extensions, you can be exposed to a leak of your data.
  • Registering on websites or Apps with our Facebook, Google+ or Twitter profiles is faster but we are providing information from these networks. Normally this action does not imply that we are giving our password to the page, but we must be attentive to who we provide personal information and what cybersecurity measures that website or App really has to protect it.

12. Make backups

  • In the event of any risk or threat of seeing our files compromised (due to theft or damage), it is interesting to have a backup solution.
  • Make backups permanently, they are the only effective (and free) measure in case you suffer a cyberkidnapping of your device (Ransomware).

13. Log out, especially in public places

  • Would you leave your front door open or your car keys on? Well, depending on the country in which you live, nothing may happen to you, but as far as Cybersecurity is concerned, never leave the session open on a public computer (in the office, in a library...). Remember to log out of all sessions before disconnecting and shutting down your computer.
  • Make sure that the "Remember password" option is not selected, because even if you leave the session, anyone who uses that device will be able to access your session again without having to know the password.

14. Always be suspicious of WiFi at the airport (or any public place)

  • The "Free WiFi" sign can be a great attraction for you, but also for anyone trying to keep your data.
  • Try to avoid connecting to an open network. If you have no other choice, avoid accessing sensitive data (banks, emails, inserting passwords for social networks, etc.). All the data circulating on that network is fully visible.
  • Consider using a VPN connection so that the information you transmit is end-to-end encrypted.

15. If you're not using the internet, turn it off

  • If you're not using it, unplug it and you'll reduce your chances of suffering a hack. As simple as turning off the router or pressing the 'airplane mode' button and ensuring an (almost) total disconnection of networks.

 

Published on 30/11/2024 » 11:41   | |    |


Comments

Reaction #1 

 by cronywell 30/11/2024 » 11:56

¡Aquí deja tu comentario!

calculator

Mercados