Month: January 2020

Cyber Security Habits Part 4

Easy and Essential Cyber Security Habits: Part 4

Easy and Essential Cyber Security Habits: Part 4

Published

Written by

Filed under

Cyber Security Habits Part 4

It’s never too late to start new cyber security habits so why not start now.

Time for the final part of our series where we’ll be giving you tips the ways you can keep your router safe

Part 4: Routers

If you have home Wi-Fi, chances are you have a router that goes along with it. But has it ever crossed your mind that your router can also be compromised? Let’s see what actions you can take in order to prevent such an unfortunate scenario from ever occurring.

Change Your Password!

The password to your router can be the entry way for a hacker access your data.

So, in order to make sure that you keep hackers at bay, create a complex password and change the router’s username on a regular basis.

Not in Use? Disable!

If there are features on your router that are not currently being used, it would be in your best interest to disable them, especially if they are features that allow for remote access. Otherwise you risk being potentially hacked.

Keep It Separate!

If you are able to create different networks on your router, then by all means, you should! By doing this, you minimize your devices’ exposure to vulnerabilities that may be lurking around.

Go with The Flow!

Most current routers come equipped with firewalls in order to monitor the flow of traffic on devices and determine what connections should be allowed.

Update, Update, Update and More Updating!

Just as you would install updates on your other devices in order to protect against any potential vulnerabilities, you need to do the same with your router. However, while your computer or phone may prompt you to update automatically, routers do not possess such a convenient feature. You will just have to remind yourself to update your router regularly to provide the most current security to your devices.

Are You Verified?

Like most of us, you probably have several devices connected to your router, but are you able to identify what devices are connected to it? If you answered no, then you should take it upon yourself to know which devices you have connected to your router. This way, you can identify and verify any unauthorized devices that are not connected to your router that may compromise your information.

We hope you enjoyed this blog series and learned about the various ways you can start your easy and essential cyber security habits today! Remember it’s never too late to form better cyber security habits!

Did you miss this series? Check out Part 1 and Part 2 for more easy and essential cyber security tips.

Read More from this Author

Cyber Security Habits Part 3

Easy and Essential Cyber Security Habits: Part 3

Published

Written by

Filed under

Cyber Security Habits Part 3It’s never too late to start new cybersecurity habits so why not start now!

Let’s begin Part Three of our series where we’ll be exploring the ways you can keep your smartphone safely secure.

Part 3: Smartphones

Nowadays, we cannot go anywhere without bringing along our phones, whether it be for work, errands, or for leisure. Since our phones have become such a crucial part of our lives, we should make every effort to put good cyber security habits to make sure that your smartphone is safeguarded against various threats and hacks.

Lock It!

Locking up your phone with a password or pattern is a great way to keep your phone protected from prying eyes, but what may not be so obvious is knowing what type of password or pattern to lock our phones with. A good rule of thumb is to never use an easy or predictable password or pattern. By doing this, you are making yourself an easy target.

Instead, opt to use a biometric password or a face authentication password.

If you still want to use a regular password or pattern to lock your phone, consider making your password or pattern complex; the more complicated, the better.

Jailbreak…or Not!

If you find yourself in a situation, where you need to jailbreak your phone, heed our advice and DON’T do it under any circumstances.

When you jail break a phone, it leaves your phone open to more vulnerabilities since it is now being forced to utilize certain services and apps that it was not intended for. It could also add unofficial application (app) stores to your phone, which are not monitored like legitimate app stores are, and can leave your phone vulnerable to downloading an unofficial app linked to malware or viruses which can be costly to remedy.

Enable Application Permission!

Often when an app is downloaded, you are asked to grant certain permissions such as access to allow the app to fully do its job. Usually this call to action is enable through a click of an “approve” or “accept” button.

You may want to think twice before you do that so carelessly. Some apps will use that access to spy on your activity or place unnecessary charges on your account.

Phishing for a Response!

Phishing scams often take place over email, but they can also take place via text message.

Some scammers send text messages with infected links that can lead them to putting malware or a virus on your phone. These text messages can be under the guise of it being ‘from your bank’ who then calls you for the conformation number they sent you, when in fact they are not your bank and are only calling to get your banking details.

Just Don’t Answer!

Everyone gets the occasional number that calls your phone and you have no idea who it is. Sometimes they are scammers waiting for you to answer in order to trick you into giving out your personal information or attempting to sell you something that you just don’t need. Moral of the lesson? Think twice before you answer these unidentified numbers; you’re better off letting it go to voicemail to see who is really on the other side of the call.

Secure It!

Security software may be an afterthought when it comes to your phone, but it is just as important, if not even more important to properly secure your phone. Using security software designed for smart phones will help prevent your phone from suffering from a security breach or cyber-attack.

Now that Part Three is wrapped up, in the final part of your Easy and Essential Cyber Security Habits series we’ll be looking at the ways you can keep your router safe.

If you enjoyed this article, you'll probably like:

Cyber Security Habits

Easy and Essential Cyber Security Habits: Part 2

Easy and Essential Cyber Security Habits: Part 2

Published

Written by

Filed under

Cyber Security HabitsIt’s never too late to start new cyber security habits so why not start now

Let’s begin Part Two of our series where we’ll be exploring the ways you can keep your passwords safe and secured.

Ah, yes, passwords. Something we all use daily, but don’t think twice about securing, even though we should. Here are a few practicalities you should consider when it comes to creating and resetting your password.

Protect Your Passwords!

It’s human nature to want to store our passwords somewhere convenient for easy accessibility, i.e. it’s written on a post-it or on your notes application, but it is easy to see why this is a big no-no; we are making it way too easy for us to be targeted.

Instead, put your passwords in a secure place such as LastPass or Password1. This way, all your passwords will be securely stored in one place. This will also relieve you of the task of remembering every single password to every one of your accounts.

Don’t Reuse Passwords!

Resist the temptation to using the same password for all your accounts. Don’t use passwords that you use for your business accounts or your personal accounts and don’t use passwords you use for your personal accounts for your business accounts. Just don’t reuse passwords in general. Trust us, you’re just setting yourself up for trouble!

It Shouldn’t Be So Simple!

Don’t make your passwords simple. Your passwords should not be ‘password’ or ‘123456’ or something else that is obvious. Use a combination of numbers, symbols and capital letters in your passwords.

Use a Two-Factor Authentication!

When possible, use two-factor authentication. This provides an extra layer of security when logging into an account.

Often with two-factor authentication, it will require the user to receive a one-time password via text message or email, in order to verify the correct user of the account.

Secure It!

A fool-proof way to ensure none of your passwords will be stolen by hackers is by installing proper cyber security systems on your digital devices. Make sure you are also updating your cybersecurity systems often to be one step ahead of the game.

Check out Part Three of this series, which includes tips on how to improve your smartphone cyber security habits!

Read More from this Author

Essential Cyber Security Habits

Easy and Essential Cyber Security Habits

Easy and Essential Cyber Security Habits

Published

Written by

Filed under

Essential Cyber Security HabitsIt’s never too late to start new cyber security habits so why not start now!

With our four-part blog series, Easy and Essential Cyber Security Habits, we will be giving you tips to help you create and improve your cyber security habits, keeping you protected and productive all year long.

 

Part 1: Where to Start?

In order to put cyber security habits into practice, you need to have a starting point, so without further ado, let’s get started.

Think Before You Click!

First and foremost, think before you click on anything. Be careful of any suspicious links that may appear in an email, on social media or on a website. These links tend to be loaded with malware or viruses that ends up wreaking havoc your computer or phone when clicked on.

It Sounds Too Good to Be True!

Just like how suspicious links can lead to the unleashing of malware or a virus, an email with an insanely good offer that requires you to click on a link or fill out your personal information is probably a scam as well. Good rule of thumb, if it sounds too good to be true, then it probably is!

Don’t Use the Wi-Fi!

Often you may find yourself at a cafe or a store or some other place that offers free Wi-Fi. Sounds safe enough, right? Well consider the fact that it may be UNSECURED public Wi-Fi, it isn’t as harmless you may think. So, what exactly does this mean to you?

This means you shouldn’t use it! Unless you absolutely need to, using unsecured public Wi-Fi puts your data at risk for being hacked and stolen! Our advice? Steer clear of using public Wi-Fi unless you know for sure that it has security protection; you just never know the intention of others especially with Wi-Fi being so accessible to everyone.

Have a Backup or Two or Three!

When it comes to cybersecurity, you can never have too much backup of your data. That being said, you should already have an additional place where all you save all your data, documents and other digital files as a backup, so in the event that you do end up being hacked, you still have all your data securely stored somewhere else. Regularly backing up your data is a great proactive way to take preventative measure against data loss.

Encryption is Key!

There is value in having your data encrypted. If you do get hacked the hacker would have a difficult time of getting your data. And if any of your devices were to be stolen it would give you an extra layer of security before remote wiping the device.

Don’t Deny

Don’t think you aren’t a target. Anyone can be hacked, have data stolen, get malware or get a virus. You need to take measures to prevent it from happening.

Wow, so many useful and helpful tips to keep good cyber security habits! In Part Two of our Easy and Essential Cyber Security Habits series, we’ll be exploring what you can do to keep your passwords safe.

Read More from this Author

Scroll to Top