2023/04/01

LEAN 365 – grab the cyber security tips of March

During March we shared a total of 31 cyber security tips in LinkedIn, Twitter and Instagram. Here is a compilation of the posts. Jump in together with Fitsec – and stay cyber safe!


60. You should have remote data wiping/factory reset enabled on your mobile device

WHY?

If you lose it or it gets stolen, you can wipe all information from your phone to prevent unauthorized access to your data

61. Never share your PIN code or password to anyone

WHY?

You have no way of knowing who can ultimately get access to your password. Passwords and PIN codes are sensitive information and should be protected.

62. If you make a mistake and open a phishing email or suspicious attachment, don’t hesitate to notify your IT/security team immediately

WHY?

A quick response to an incident may prevent any damages or at least minimize the impact on your organization

63. Make sure your employees only have access to assets that they need

WHY?

Giving your employees unnecessary access will cause more damage if they are compromised

64. Prefer your phone’s hotspot over public Wi-Fi

WHY?

Using your own hotspot is more secure than public Wi-Fi 

65. Make sure your desk is clean and doesn’t have sensitive documents on it when you are not present

WHY?

You never know who can have access to the documents 

66. Deny location sharing by default

WHY?

There is rarely a good reason for services to access your location. Limiting the amount of information you share is always a good idea. 

67. Think twice about what information you share about yourself when creating a new profile to some new service

WHY?

Some services may enable unauthorized third parties to collect this information about you

68. Keep in mind that any operating system can be infected by malware

WHY?

A common mistake is to assume that only Windows based systems are targeted by malware

69. Avoid public phone charging stations

WHY?

Malicious actors have been known to target public charging stations to infect your device

70. Before disposal, shred documents that contain personal information

WHY?

An unauthorized third party with malicious intent could get hold of your personal data and use it to harm you in numerous ways

71. Factory resetting a mobile device usually removes active malware on the device

WHY?

Most malware do not persist after a factory reset

72. Beware of marketplace scams. Never send money upfront when dealing with second-hand goods

WHY?

There are plenty of scams in used item marketplaces that take advantage of an unsuspecting buyer

73. You should use full disk encryption on your computer

WHY?

If your computer is stolen, your data is protected

74. Separate your work accounts from private ones

WHY? 

Using your work accounts for personal activities may endanger your organization’s security and may also result in losing access to your private accounts if they are tied to your work email for example 

75. Report phishing emails or other suspicious emails to your helpdesk/security team 

WHY? 

Reporting phishing emails helps protect your organization

76. Do not leave your personal belongings in plain sight in your car 

WHY? 

Your car will be more likely to be targeted by criminals 

77. SMS is not a secure messaging service

WHY?

There are multiple methods to capture SMS messages

78. Keep your devices turned off when not using them

WHY? 

There are many benefits to this, for example, when your device is turned off it is safe from network-based threats

79. Check your bank transactions regularly

WHY? 

This may show if somebody has access to your accounts

80. Don’t use actual personal information when answering security questions

WHY? 

If the answers to security questions have nothing to do with you, it will be more difficult for an attacker to guess them

81. Disable NFC on your device when not using it

WHY? 

NFC allows your phone to transfer data if it touches another NFC device

82. Always remember to logout of your accounts when you’re done

WHY? 

It’s simply a good practice that keeps you safer

83. If you’re connecting to a public Wi-Fi, make sure it’s the right one

WHY?  

It’s a common attack method to have a similar name to the actual Wi-Fi and use that to steal your information (for example: Starbucks-wifi vs Starbucks_WIFI etc.)

84. Remember to update the firmware of your devices periodically

WHY? 

Updating the firmware of your devices helps to keep them secure

85. Does your fridge or washing machine etc. really need an internet connection?

WHY? 

IOT devices often suffer from multiple vulnerabilities and may compromise your network

86. Do not share photos of your keys 

WHY? 

Certain types of keys can be cloned with just a photo of the key

87. Do not use public printers to print sensitive documents 

WHY? 

Some printers may save a copy of the file on an internal drive

88. When shopping online, search for reviews of the website before you place an order

WHY? 

Reading the reviews can tell you if the site can be trusted

89. Use encrypted email for exchanging sensitive data

WHY? 

Regular email is not encrypted by default

90. Disable auto connecting to Wi-Fi networks

WHY? 

Your device might automatically connect to a Wi-Fi that is pretending to be the intended Wi-Fi. This attack is called the Evil Twin attack.






No comments:

Post a Comment