2023/12/01

LEAN 365 – grab the cyber security tips of November

During November we shared a total of 8 cyber security tips in LinkedInTwitter and Instagram. Here is a compilation of the posts. Jump in together with Fitsec – and stay cyber safe!


193. Implement email authentication protocols like SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance)

WHY?

This helps verify the legitimacy of email senders and prevent email spoofing


194. Modern browsers provide warnings about potentially malicious websites. Encourage users to heed these warnings.

WHY?

This can prevent them from proceeding to suspicious sites and getting malware infection


195. Avoid excessive data collection in your organization and regularly review the data being stored

WHY?

Organizations should only collect and retain the minimum amount of personal data necessary to fulfil their intended purposes and ensure it remains relevant and necessary


196. Be careful when using third-party driver updater tools

WHY?

Some of these tools can introduce security risks or install incorrect drivers


197.
Consider using honeypots for threat intelligence

WHY?

This can help your security teams proactively discover threats and provide valuable insights into the attackers’ methods and motivations


198. Consider using an ad-blocker

WHY?

To prevent tracking of your online activities and enhance your privacy


199. In emails, use CC wisely, for example to protect the recipients from ending up getting too many emails or spam

WHY?

Many viruses and spam programs are nowadays able to sift through mail files and address books for email addresses


200. To check if your online accounts have been compromised, you can use the haveibeenpwned.com service

WHY?


Haveibeenpwned is a trustworthy service, and you can even setup constant monitoring to be alerted of new compromises related to your email account






2023/11/01

LEAN 365 – grab the cyber security tips of October

During October we shared a total of 9 cyber security tips in LinkedInTwitter and Instagram. Here is a compilation of the posts. Jump in together with Fitsec – and stay cyber safe!


184. Remember to delete or deactivate all accounts of a person leaving the company right away

WHY? 

To prevent unauthorized access to your company systems by ex-employees


185.
If possible, use Secure DNS over HTTPS (DoH)

WHY? 

To enhance privacy in your web browsing


186. Compare the transactions on your credit card bill to the purchases you’ve made. If you notice an unjustified charge, inform your credit card company right away.

WHY? 

It can be troublesome to resolve the issue later


187. Implement proper network segmentation and access controls

WHY? 

This can limit the potential impact of an attacker's access to the network)


188.
Use email filtering solutions in your company

WHY? 

This helps to identify and block phishing emails and malicious attachments before they reach users' inboxes

189. Monitor the traffic in your company’s information networks for unusual or suspicious activities

WHY?

This helps to respond to incidents effectively when the attacker’s actions are noticed in time


190.
If you have control over your BGP routing, consider using BGP Flowspec

WHY?

This helps to dynamically update routing policies during a possible attack


191.
Use WAFs (Web Application Firewalls) for your public facing services

WHY?

To help filter out malicious traffic and requests

192. Use URL analysis tools or sandboxes to scan URLs embedded in emails and identify potentially malicious websites

WHY?

These tools can help detect and block phishing links and other malicious links




2023/10/01

LEAN 365 – grab the cyber security tips of September

During September we shared a total of 9 cyber security tips in LinkedInTwitter and Instagram. Here is a compilation of the posts. Jump in together with Fitsec – and stay cyber safe!


175. Restrict the installation of software to authorized personnel

WHY? 

This reduces the risk of malicious software installations

176. Implement role-based access control

WHY? 

This restricts employee access to sensitive data and systems based on their job roles

177. Keep your apps up to date

WHY? 

Developers often release updates to patch security vulnerabilities and improve performance

178. Be wary of apps that request excessive permissions

WHY? 

Some apps request access to sensitive data or device features (e.g., camera, microphone, location). Make sure the permissions align with the app's functionality.

179. Regularly back up your mobile device too 

WHY? 

This can help to safeguard your data in case of loss or theft

180. Use secure instant messaging apps that support end-to-end encryption like Signal or Wire

WHY?

This ensures data integrity, security, privacy, and confidentiality in your communications

181. Protect the information related to your company's personnel, salaries, products, and sales

WHY?

A leak of confidential information can bring down an entire company

182. When dealing with visitors in your company, verify who you are dealing with by asking to see an ID card

WHY?

To prevent unauthorised access to your company’s premises

183. Join your local CERT authority mailing list for vulnerability alerts and other information

WHY?

To stay informed about the latest warnings of security vulnerabilities and events





2023/09/01

LEAN 365 – grab the cyber security tips of August

During August we shared a total of 9 cyber security tips in LinkedInTwitter and Instagram. Here is a compilation of the posts. Jump in together with Fitsec – and stay cyber safe!


166. Don't use public computers like library computers for handling sensitive information

WHY? 

You can never be sure that the computer has not been compromised

167. Consider different backup storage options based on your needs and create a backup schedule

WHY? 

Regular backups are recommended to ensure the most up-to-date copies of your data

168. Guard your company premises carefully for example with guards, locks, and alarms

WHY? 

Physical weaknesses in infrastructures can be exploited. For example, to gain unauthorized physical access to servers or workstations.

169. Use backup software or built-in tools

WHY? 

Backup software can automate the backup process, making it easier and more efficient. Alternatively, your operating system may have built-in backup utilities, such as Windows Backup and Time Machine on macOS.

170. When creating software, check your code thoroughly for common errors like poor input validation, insecure data storage, or lack of proper error handling. A third-party audit of your software before release can be helpful.

WHY? 

Mistakes made during the software development process can lead to vulnerabilities 

171. Encrypt your backups 

WHY? 

If your files contain sensitive or confidential information, consider encrypting your backups. Encryption adds an extra layer of security to protect your data in case of unauthorized access to the backup storage.

172. Conduct regular security audits and assessments

WHY?

This helps organizations identify vulnerabilities and weaknesses in their environment and proactively address these potential risks before they are exploited by an attacker

173. Test your backups

WHY?

It's crucial to periodically test your backups to ensure they are functioning correctly. Attempt a restore process to confirm that your files can be successfully retrieved from the backup.

174. Implement redundancy by using backup systems, duplicate hardware, and failover mechanisms

WHY?

This way you can ensure continuity of service during disruptions


2023/08/01

LEAN 365 – grab the cyber security tips of July

During July we shared a total of 8 cyber security tips in LinkedIn, Twitter and Instagram. Here is a compilation of the posts. Jump in together with Fitsec – and stay cyber safe!


158. Before clicking a link in an email message, you can hover your mouse over it to see the actual destination of the link

WHY? 

This can be used to identify potentially malicious links. For example, if the link text has a domain that differs from the actual link destination.


159. Don't buy cheap, no-name security cameras or other security devices

WHY? 

In addition to the old saying “buy cheap, buy twice”, cheap security devices often contain vulnerabilities and are not maintained by the manufacturer


160. On any devices that support it, make sure your screen automatically turns off and logs you out/locks itself when not in use

WHY? 

In case you forget to lock your device when leaving it unattended, your device locks itself and helps prevent unauthorized access to your device 


161. Don’t upload sensitive files to cloud services

WHY? 

Usually, the risk of an attacker gaining access to your account and sensitive files via cloud services is greater than an attacker gaining access to your local machine


162. Be careful with browser extensions 

WHY? 

Browser extensions can be malicious. If you haven’t heard of an extension or a website wants you to download one, you should be cautious. 


163. Periodically, check if your router still gets updates from your provider’s support page

WHY? 

If you are using a router that doesn’t get updates, it means it will not get the latest security updates and might leave you vulnerable for attacks


164. Don’t buy used USB drives or other storage devices

WHY? 

They might contain malicious files


165. Look out for social engineering. Do not trust just anyone and be suspicious if someone asks “too many questions” about your company.

WHY?

It is a technique that involves manipulating individuals to divulge confidential information or perform certain actions. It could be through impersonation, building trust, or manipulating emotions.