2020 Cyber Security recommendations
We've entered a new decade, and along with the resolutions that we all make, it seems like the perfect time to perform a bit of cyber security check. A lot of readers will have likely received some form of new technology over the Christmas period which also emphasises that we shouldn't be getting carried away with the technology before ensuring it's safe to use or that what it's replacing is safely archived/destroyed. To help with this we have pulled together a list of some great cyber hygiene tasks below.
1> A replacement item, means that something's going in the bin, on the shelf or being hidden in a drawer. What everyone should be doing is powering up the old item, and copying over any information that is to be retained, and then removing everything else so that the device has nothing important on it.
2> Any technology or old paperwork that is being thrown in the trash, needs to be done so correctly. Firstly if it's electronic, it needs to go an appropriate electronics destruction facility. Secondly before doing this all storage should be removed. If it's a hard drive put a drill through it a few times, smash it up with a hammer and if it's another form of storage such as an SD card, then again take a hammer to it. This will prevent the storage from being readable again. If it's paperwork, and this is a great time to refresh the documents, then make sure they're thoroughly shredded before disposing of them. Ideally use a secure disposal company for both electronic and paper information.
3> A new cellphone, laptop or tablet has been purchased: This means there is a small check list of things that should be done.
a> Check that the item has an appropriate anti-malware solution on it. Even a free solution is better than no solution. Look at Sophos or Avast etc.
b> Ensure that the device is encrypted, if anything sensitive is going to be used on the device then it should really be encrypted. There are many solutions out there from windows based through to android and apple.
c> Put a password on the device, assuming encryption is on the device it will require a password or a pin most likely, but if not because an appropriate encryption software isn't possible, then at least password protect it. Follow password best practices for this, do not use 123456 etc.
4> This is also a great time of the year to sort through email. Yes this is a daunting task considering the scale and size of email inboxes, but if not now then when? Removing old emails, means they're not in the inbox running the risk of being exposed if your email account is ever breached.
5> Review the website accounts you have created over the last year and if they're no longer used, log into them and remove your accounts. Under the GDPR regulations you're entitled to do this, unless there is a legal reason for the account.
These are some very simple tasks to complete, but they're important and also very effective. Following this advice will assist in protecting yourself and your identity.
- How to uncover network vulnerabilities
- Protecting your identity online
- What is a VPN and why do you need one?
- Quick tips to improve your board’s cybersecurity
- Password Management Software
- How to make of your employees the best line of cyber defence against cyberattacks
- Certificate management processes
- What is Phishing and what can you do to prevent it?
- Found malware, now what do you do?
- Data breaches and other scary 2019 events- Special Halloween post
- How to get your cyber security budget approved by the board
- The TechForce Sponsorships
- How to start a career in the security industry
- Protecting your business in the cyber security era
- Secure Your Supply Chain
- Case study: British Airways Fined £183.4million for Data Breach
- The Silver Bullet in Cyber Security
- Fake invoice email scams and Office 365
- How to apply for the Cyber Essentials Voucher Scheme
- What is Business Email Compromise (BEC) and how to stop it
- Everything you need to know about Cyber Essentials
- Cyber Essentials Demystified
- How to choose a Security Awareness Platform
- 6 Quick and Easy Email Security Tips for Dummies
- Hackers On Tour
- How to share passwords safely in your Small Business
- In the news - Warning. North Sea firms likely already attacked
- 10 Steps to Cyber Security
- 6 Top Tips to Prevent Cyber Attacks
How to uncover network vulnerabilities
If you are new in IT and want to know where to start finding vulnerabilities on the network you're managing this blog post might be for you.More
Protecting your identity online
Is it possible to really protect your identity online? How do “you” protect your identity online and how do others that have your identification details protect you in the ever expanding “online” aspect of computing?More
What is a VPN and why do you need one?
We tell you in this post why it is useful to have a VPN connectionMore
Quick tips to improve your board’s cybersecurity
For some CISOs, it is a challenge to communicate your priorities to the board. We provide you here with some quick tips to ensure your board knows more about cybersecurity and how to act upon it.More
FOR LATEST UPDATES SUBSCRIBE HERE: