2023/09/01

LEAN 365 – grab the cyber security tips of August

During August we shared a total of 9 cyber security tips in LinkedInTwitter and Instagram. Here is a compilation of the posts. Jump in together with Fitsec – and stay cyber safe!


166. Don't use public computers like library computers for handling sensitive information

WHY? 

You can never be sure that the computer has not been compromised

167. Consider different backup storage options based on your needs and create a backup schedule

WHY? 

Regular backups are recommended to ensure the most up-to-date copies of your data

168. Guard your company premises carefully for example with guards, locks, and alarms

WHY? 

Physical weaknesses in infrastructures can be exploited. For example, to gain unauthorized physical access to servers or workstations.

169. Use backup software or built-in tools

WHY? 

Backup software can automate the backup process, making it easier and more efficient. Alternatively, your operating system may have built-in backup utilities, such as Windows Backup and Time Machine on macOS.

170. When creating software, check your code thoroughly for common errors like poor input validation, insecure data storage, or lack of proper error handling. A third-party audit of your software before release can be helpful.

WHY? 

Mistakes made during the software development process can lead to vulnerabilities 

171. Encrypt your backups 

WHY? 

If your files contain sensitive or confidential information, consider encrypting your backups. Encryption adds an extra layer of security to protect your data in case of unauthorized access to the backup storage.

172. Conduct regular security audits and assessments

WHY?

This helps organizations identify vulnerabilities and weaknesses in their environment and proactively address these potential risks before they are exploited by an attacker

173. Test your backups

WHY?

It's crucial to periodically test your backups to ensure they are functioning correctly. Attempt a restore process to confirm that your files can be successfully retrieved from the backup.

174. Implement redundancy by using backup systems, duplicate hardware, and failover mechanisms

WHY?

This way you can ensure continuity of service during disruptions