LEAN 365 – grab the cyber security tips of November

During November we shared a total of 8 cyber security tips in LinkedInTwitter and Instagram. Here is a compilation of the posts. Jump in together with Fitsec – and stay cyber safe!

193. Implement email authentication protocols like SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance)


This helps verify the legitimacy of email senders and prevent email spoofing

194. Modern browsers provide warnings about potentially malicious websites. Encourage users to heed these warnings.


This can prevent them from proceeding to suspicious sites and getting malware infection

195. Avoid excessive data collection in your organization and regularly review the data being stored


Organizations should only collect and retain the minimum amount of personal data necessary to fulfil their intended purposes and ensure it remains relevant and necessary

196. Be careful when using third-party driver updater tools


Some of these tools can introduce security risks or install incorrect drivers

Consider using honeypots for threat intelligence


This can help your security teams proactively discover threats and provide valuable insights into the attackers’ methods and motivations

198. Consider using an ad-blocker


To prevent tracking of your online activities and enhance your privacy

199. In emails, use CC wisely, for example to protect the recipients from ending up getting too many emails or spam


Many viruses and spam programs are nowadays able to sift through mail files and address books for email addresses

200. To check if your online accounts have been compromised, you can use the haveibeenpwned.com service


Haveibeenpwned is a trustworthy service, and you can even setup constant monitoring to be alerted of new compromises related to your email account


LEAN 365 – grab the cyber security tips of October

During October we shared a total of 9 cyber security tips in LinkedInTwitter and Instagram. Here is a compilation of the posts. Jump in together with Fitsec – and stay cyber safe!

184. Remember to delete or deactivate all accounts of a person leaving the company right away


To prevent unauthorized access to your company systems by ex-employees

If possible, use Secure DNS over HTTPS (DoH)


To enhance privacy in your web browsing

186. Compare the transactions on your credit card bill to the purchases you’ve made. If you notice an unjustified charge, inform your credit card company right away.


It can be troublesome to resolve the issue later

187. Implement proper network segmentation and access controls


This can limit the potential impact of an attacker's access to the network)

Use email filtering solutions in your company


This helps to identify and block phishing emails and malicious attachments before they reach users' inboxes

189. Monitor the traffic in your company’s information networks for unusual or suspicious activities


This helps to respond to incidents effectively when the attacker’s actions are noticed in time

If you have control over your BGP routing, consider using BGP Flowspec


This helps to dynamically update routing policies during a possible attack

Use WAFs (Web Application Firewalls) for your public facing services


To help filter out malicious traffic and requests

192. Use URL analysis tools or sandboxes to scan URLs embedded in emails and identify potentially malicious websites


These tools can help detect and block phishing links and other malicious links


LEAN 365 – grab the cyber security tips of September

During September we shared a total of 9 cyber security tips in LinkedInTwitter and Instagram. Here is a compilation of the posts. Jump in together with Fitsec – and stay cyber safe!

175. Restrict the installation of software to authorized personnel


This reduces the risk of malicious software installations

176. Implement role-based access control


This restricts employee access to sensitive data and systems based on their job roles

177. Keep your apps up to date


Developers often release updates to patch security vulnerabilities and improve performance

178. Be wary of apps that request excessive permissions


Some apps request access to sensitive data or device features (e.g., camera, microphone, location). Make sure the permissions align with the app's functionality.

179. Regularly back up your mobile device too 


This can help to safeguard your data in case of loss or theft

180. Use secure instant messaging apps that support end-to-end encryption like Signal or Wire


This ensures data integrity, security, privacy, and confidentiality in your communications

181. Protect the information related to your company's personnel, salaries, products, and sales


A leak of confidential information can bring down an entire company

182. When dealing with visitors in your company, verify who you are dealing with by asking to see an ID card


To prevent unauthorised access to your company’s premises

183. Join your local CERT authority mailing list for vulnerability alerts and other information


To stay informed about the latest warnings of security vulnerabilities and events


LEAN 365 – grab the cyber security tips of August

During August we shared a total of 9 cyber security tips in LinkedInTwitter and Instagram. Here is a compilation of the posts. Jump in together with Fitsec – and stay cyber safe!

166. Don't use public computers like library computers for handling sensitive information


You can never be sure that the computer has not been compromised

167. Consider different backup storage options based on your needs and create a backup schedule


Regular backups are recommended to ensure the most up-to-date copies of your data

168. Guard your company premises carefully for example with guards, locks, and alarms


Physical weaknesses in infrastructures can be exploited. For example, to gain unauthorized physical access to servers or workstations.

169. Use backup software or built-in tools


Backup software can automate the backup process, making it easier and more efficient. Alternatively, your operating system may have built-in backup utilities, such as Windows Backup and Time Machine on macOS.

170. When creating software, check your code thoroughly for common errors like poor input validation, insecure data storage, or lack of proper error handling. A third-party audit of your software before release can be helpful.


Mistakes made during the software development process can lead to vulnerabilities 

171. Encrypt your backups 


If your files contain sensitive or confidential information, consider encrypting your backups. Encryption adds an extra layer of security to protect your data in case of unauthorized access to the backup storage.

172. Conduct regular security audits and assessments


This helps organizations identify vulnerabilities and weaknesses in their environment and proactively address these potential risks before they are exploited by an attacker

173. Test your backups


It's crucial to periodically test your backups to ensure they are functioning correctly. Attempt a restore process to confirm that your files can be successfully retrieved from the backup.

174. Implement redundancy by using backup systems, duplicate hardware, and failover mechanisms


This way you can ensure continuity of service during disruptions


LEAN 365 – grab the cyber security tips of July

During July we shared a total of 8 cyber security tips in LinkedIn, Twitter and Instagram. Here is a compilation of the posts. Jump in together with Fitsec – and stay cyber safe!

158. Before clicking a link in an email message, you can hover your mouse over it to see the actual destination of the link


This can be used to identify potentially malicious links. For example, if the link text has a domain that differs from the actual link destination.

159. Don't buy cheap, no-name security cameras or other security devices


In addition to the old saying “buy cheap, buy twice”, cheap security devices often contain vulnerabilities and are not maintained by the manufacturer

160. On any devices that support it, make sure your screen automatically turns off and logs you out/locks itself when not in use


In case you forget to lock your device when leaving it unattended, your device locks itself and helps prevent unauthorized access to your device 

161. Don’t upload sensitive files to cloud services


Usually, the risk of an attacker gaining access to your account and sensitive files via cloud services is greater than an attacker gaining access to your local machine

162. Be careful with browser extensions 


Browser extensions can be malicious. If you haven’t heard of an extension or a website wants you to download one, you should be cautious. 

163. Periodically, check if your router still gets updates from your provider’s support page


If you are using a router that doesn’t get updates, it means it will not get the latest security updates and might leave you vulnerable for attacks

164. Don’t buy used USB drives or other storage devices


They might contain malicious files

165. Look out for social engineering. Do not trust just anyone and be suspicious if someone asks “too many questions” about your company.


It is a technique that involves manipulating individuals to divulge confidential information or perform certain actions. It could be through impersonation, building trust, or manipulating emotions.