During May we shared a total of 30 cyber security tips in LinkedIn, Twitter and Instagram.
Here is a compilation of the posts. Jump in together with Fitsec – and stay cyber safe!
121. When changing sim cards, always destroy the old one
WHY?
Old sim cards may hold some information like phone numbers and even some text messages
122. Clear your browser history from time to time
WHY?
Your browser history and cookies are valuable information to an attacker. This information can be used to build a profile of you for future attacks against you.
123. Turn on memory integrity from your Windows settings
WHY?
The memory integrity feature prevents malicious code being injected into high-security processes on your computer
124. When traveling, keep your devices/valuables in the hotel room safe when not in use
WHY?
If someone breaks in or has access to your hotel room, you have at least some protection against the theft of your devices
125. Do not enable automatic login on your device
WHY?
If someone steals your device, they have instant access to all your data
126. Make sure the electric chip is broken to pieces from old debit/credit cards
WHY?
If the electric chip is intact, someone might be able to get something out from it
127. Before disposing of delivery packages, make sure to get rid of any sensitive information on them
WHY?
Someone could get your personal information from the package and use it for malicious intent
128. Be careful of malicious text messages and never click links in text messages
WHY?
Text messages are often used for phishing attacks and clicking a link can get you compromised
129. If an account of yours is compromised, change the password immediately
WHY?
It helps prevent the hacker from accessing your account again if they log off and, in some cases, logs the hacker out
130. Make sure your LinkedIn account is connected to your mobile device
WHY?
Doing this will ensure you can easily reset/change your password and enable two factor authentication
131. If the buttons, screen or info labels on an ATM/cash machine look misaligned or out of place, don’t use the ATM
WHY?
There is a good chance that the ATM has been tampered with and can be used to steal your card information
132. When buying used devices, always perform a factory reset of the device
WHY?
You never know what has been left on the device by the previous owner. It is not uncommon to find malware on used devices.
133. Don't use end of life operating systems like Windows 7 (end of life: "a product that is outdated or unsupported by the manufacturer")
WHY?
End of life operating systems/products will not get important security updates and will leave you seriously vulnerable to attacks
134. Don't trust online quizzes
WHY?
Online quizzes often have terms and conditions to allow them to sell your data to third parties. Even when you do not give any information, they can gather your IP-address, location, and possibly profile information if you’re logged in to social media services
135. Don't blindly trust caller ID’s or phone numbers
WHY?
Spoofing phone numbers to scam or trick people is common. If something seems off, hang up and visit the website of the organization that is supposedly calling you and call them back on their officially listed number.
136. There are encrypted USB drives available for purchase, so consider buying them instead
WHY?
The encryption will make it difficult for attackers to access the information on the drive if you happen to lose it or it is stolen
137. If your computer or device is stolen, change all passwords to any accounts you have
WHY?
If your device contains your passwords, they can be compromised
138. If you're suspicious of a website, for any reason, simply don't use it
WHY?
Being suspicious is reason enough to not use it, better safe than sorry as the saying goes
139. If you live in Europe, choose a cloud provider that complies with GDPR
WHY?
Generally, GDPR compliance ensures that your data will be handled properly and can be deleted upon request
140. Use a DNS filtering service that blocks known malicious websites
WHY?
It helps with blocking malicious websites and known scam websites, keeping you safer on the internet
141. Disable notification content on your phone’s lock screen
WHY?
To prevent others from viewing your sensitive information when your device is locked
142. Periodically check if your desktop machine has additional unknown devices attached to it
WHY?
Unknown cables or peripherals can pose a risk to your system’s security. This type of technique has been used by bad actors in the past.
143. If you've been hacked, consider professional help
WHY?
Going to a professional to aid you in this situation is far better than trying to fix it yourself. With professional help, the situation can be resolved faster, and the damages can be minimized or contained.
144. Don't use any personal information like your name, birth date, or phone number in your usernames
WHY?
This can make it easier to gain or link sensitive and private information about you
145. If you see messages being sent from your email account that you didn't send, run a virus scan and change all your passwords immediately
WHY?
This is often a sign that you have been compromised in some way. A quick response can minimize the damage.
146. Always follow the instruction/installation manual when installing a new device
WHY?
It will give you a step-by-step guide to installing it correctly and safely, for example: many devices have security suggestions in the manual
147. Don't download apps from third-party sites
WHY?
Apps from third-party sites have a greater probability of being malicious
148. If your virus protection puts something in quarantine, just leave it there if you don't know what you're doing
WHY?
The virus protection put it there for a reason, it could be malicious or just suspicious, either way its best to leave it untouched
149. Don't trust online password checkers or generators, instead, make your own passwords
WHY?
You have no way of verifying what the website is doing with the checked/generated password. To be safe, it’s better not to use these websites at all.
150. If you get an email stating that you have been “hacked”, and the sender demands payment, ignore it.
WHY?
In most cases, this is a scam and used to extort money from you
No comments:
Post a Comment