During March we shared a total of 31 cyber security tips in LinkedIn, Twitter and Instagram. Here is a compilation of the posts. Jump in together with Fitsec – and stay cyber safe!
60. You should have remote data wiping/factory reset enabled on your mobile device
WHY?
If you lose it or it gets stolen, you can wipe all information from your phone to prevent unauthorized access to your data
61. Never share your PIN code or password to anyone
WHY?
You have no way of knowing who can ultimately get access to your password. Passwords and PIN codes are sensitive information and should be protected.
62. If you make a mistake and open a phishing email or suspicious attachment, don’t hesitate to notify your IT/security team immediately
WHY?
A quick response to an incident may prevent any damages or at least minimize the impact on your organization
63. Make sure your employees only have access to assets that they need
WHY?
Giving your employees unnecessary access will cause more damage if they are compromised
64. Prefer your phone’s hotspot over public Wi-Fi
WHY?
Using your own hotspot is more secure than public Wi-Fi
65. Make sure your desk is clean and doesn’t have sensitive documents on it when you are not present
WHY?
You never know who can have access to the documents
66. Deny location sharing by default
WHY?
There is rarely a good reason for services to access your location. Limiting the amount of information you share is always a good idea.
67. Think twice about what information you share about yourself when creating a new profile to some new service
WHY?
Some services may enable unauthorized third parties to collect this information about you
68. Keep in mind that any operating system can be infected by malware
WHY?
A common mistake is to assume that only Windows based systems are targeted by malware
69. Avoid public phone charging stations
WHY?
Malicious actors have been known to target public charging stations to infect your device
70. Before disposal, shred documents that contain personal information
WHY?
An unauthorized third party with malicious intent could get hold of your personal data and use it to harm you in numerous ways
71. Factory resetting a mobile device usually removes active malware on the device
WHY?
Most malware do not persist after a factory reset
72. Beware of marketplace scams. Never send money upfront when dealing with second-hand goods
WHY?
There are plenty of scams in used item marketplaces that take advantage of an unsuspecting buyer
73. You should use full disk encryption on your computer
WHY?
If your computer is stolen, your data is protected
74. Separate your work accounts from private ones
WHY?
Using your work accounts for personal activities may endanger your organization’s security and may also result in losing access to your private accounts if they are tied to your work email for example
75. Report phishing emails or other suspicious emails to your helpdesk/security team
WHY?
Reporting phishing emails helps protect your organization
76. Do not leave your personal belongings in plain sight in your car
WHY?
Your car will be more likely to be targeted by criminals
77. SMS is not a secure messaging service
WHY?
There are multiple methods to capture SMS messages
78. Keep your devices turned off when not using them
WHY?
There are many benefits to this, for example, when your device is turned off it is safe from network-based threats
79. Check your bank transactions regularly
WHY?
This may show if somebody has access to your accounts
80. Don’t use actual personal information when answering security questions
WHY?
If the answers to security questions have nothing to do with you, it will be more difficult for an attacker to guess them
81. Disable NFC on your device when not using it
WHY?
NFC allows your phone to transfer data if it touches another NFC device
82. Always remember to logout of your accounts when you’re done
WHY?
It’s simply a good practice that keeps you safer
83. If you’re connecting to a public Wi-Fi, make sure it’s the right one
WHY?
It’s a common attack method to have a similar name to the actual Wi-Fi and use that to steal your information (for example: Starbucks-wifi vs Starbucks_WIFI etc.)
84. Remember to update the firmware of your devices periodically
WHY?
Updating the firmware of your devices helps to keep them secure
85. Does your fridge or washing machine etc. really need an internet connection?
WHY?
IOT devices often suffer from multiple vulnerabilities and may compromise your network
86. Do not share photos of your keys
WHY?
Certain types of keys can be cloned with just a photo of the key
87. Do not use public printers to print sensitive documents
WHY?
Some printers may save a copy of the file on an internal drive
88. When shopping online, search for reviews of the website before you place an order
WHY?
Reading the reviews can tell you if the site can be trusted
89. Use encrypted email for exchanging sensitive data
WHY?
Regular email is not encrypted by default
90. Disable auto connecting to Wi-Fi networks
WHY?
Your device might automatically connect to a Wi-Fi that is pretending to be the intended Wi-Fi. This attack is called the Evil Twin attack.