2023/06/01

LEAN 365 – grab the cyber security tips of May

During May we shared a total of 30 cyber security tips in LinkedInTwitter and Instagram.
Here is a compilation of the posts. Jump in together with Fitsec – and stay cyber safe!


121. When changing sim cards, always destroy the old one

WHY?

Old sim cards may hold some information like phone numbers and even some text messages

122. Clear your browser history from time to time

WHY? 

Your browser history and cookies are valuable information to an attacker. This information can be used to build a profile of you for future attacks against you.

123. Turn on memory integrity from your Windows settings

WHY? 

The memory integrity feature prevents malicious code being injected into high-security processes on your computer 

124. When traveling, keep your devices/valuables in the hotel room safe when not in use

WHY? 

If someone breaks in or has access to your hotel room, you have at least some protection against the theft of your devices

125. Do not enable automatic login on your device

WHY? 

If someone steals your device, they have instant access to all your data

126. Make sure the electric chip is broken to pieces from old debit/credit cards

WHY? 

If the electric chip is intact, someone might be able to get something out from it

127. Before disposing of delivery packages, make sure to get rid of any sensitive information on them

WHY? 

Someone could get your personal information from the package and use it for malicious intent


128. Be careful of malicious text messages and never click links in text messages

WHY? 

Text messages are often used for phishing attacks and clicking a link can get you compromised

129. If an account of yours is compromised, change the password immediately

WHY? 

It helps prevent the hacker from accessing your account again if they log off and, in some cases, logs the hacker out

130. Make sure your LinkedIn account is connected to your mobile device

WHY? 

Doing this will ensure you can easily reset/change your password and enable two factor authentication 

131. If the buttons, screen or info labels on an ATM/cash machine look misaligned or out of place, don’t use the ATM

WHY? 

There is a good chance that the ATM has been tampered with and can be used to steal your card information

132. When buying used devices, always perform a factory reset of the device

WHY? 

You never know what has been left on the device by the previous owner. It is not uncommon to find malware on used devices.

133. Don't use end of life operating systems like Windows 7 (end of life: "a product that is outdated or unsupported by the manufacturer")

WHY? 

End of life operating systems/products will not get important security updates and will leave you seriously vulnerable to attacks

134. Don't trust online quizzes

WHY? 

Online quizzes often have terms and conditions to allow them to sell your data to third parties. Even when you do not give any information, they can gather your IP-address, location, and possibly profile information if you’re logged in to social media services

135. Don't blindly trust caller ID’s or phone numbers

WHY? 

Spoofing phone numbers to scam or trick people is common. If something seems off, hang up and visit the website of the organization that is supposedly calling you and call them back on their officially listed number.

136. There are encrypted USB drives available for purchase, so consider buying them instead

WHY? 

The encryption will make it difficult for attackers to access the information on the drive if you happen to lose it or it is stolen

137. If your computer or device is stolen, change all passwords to any accounts you have

WHY?

If your device contains your passwords, they can be compromised

138. If you're suspicious of a website, for any reason, simply don't use it

WHY? 

Being suspicious is reason enough to not use it, better safe than sorry as the saying goes

139. If you live in Europe, choose a cloud provider that complies with GDPR

WHY? 

Generally, GDPR compliance ensures that your data will be handled properly and can be deleted upon request

140. Use a DNS filtering service that blocks known malicious websites

WHY? 

It helps with blocking malicious websites and known scam websites, keeping you safer on the internet

141. Disable notification content on your phone’s lock screen

WHY? 

To prevent others from viewing your sensitive information when your device is locked

142. Periodically check if your desktop machine has additional unknown devices attached to it

WHY? 

Unknown cables or peripherals can pose a risk to your system’s security. This type of technique has been used by bad actors in the past.

143. If you've been hacked, consider professional help

WHY? 

Going to a professional to aid you in this situation is far better than trying to fix it yourself. With professional help, the situation can be resolved faster, and the damages can be minimized or contained.

144. Don't use any personal information like your name, birth date, or phone number in your usernames

WHY? 

This can make it easier to gain or link sensitive and private information about you

145. If you see messages being sent from your email account that you didn't send, run a virus scan and change all your passwords immediately

WHY? 

This is often a sign that you have been compromised in some way. A quick response can minimize the damage.

146. Always follow the instruction/installation manual when installing a new device

WHY? 

It will give you a step-by-step guide to installing it correctly and safely, for example: many devices have security suggestions in the manual

147. Don't download apps from third-party sites

WHY? 

Apps from third-party sites have a greater probability of being malicious

148. If your virus protection puts something in quarantine, just leave it there if you don't know what you're doing

WHY? 

The virus protection put it there for a reason, it could be malicious or just suspicious, either way its best to leave it untouched

149. Don't trust online password checkers or generators, instead, make your own passwords

WHY? 

You have no way of verifying what the website is doing with the checked/generated password. To be safe, it’s better not to use these websites at all.

150. If you get an email stating that you have been “hacked”, and the sender demands payment, ignore it.

WHY? 

In most cases, this is a scam and used to extort money from you


No comments:

Post a Comment