193. Implement email authentication protocols like SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance)WHY?
This helps verify the legitimacy of email senders and prevent email spoofing
194. Modern browsers provide warnings about potentially malicious websites. Encourage users to heed these warnings.
This can prevent them from proceeding to suspicious sites and getting malware infection
195. Avoid excessive data collection in your organization and regularly review the data being stored
Organizations should only collect and retain the minimum amount of personal data necessary to fulfil their intended purposes and ensure it remains relevant and necessary
196. Be careful when using third-party driver updater tools
Some of these tools can introduce security risks or install incorrect drivers
197. Consider using honeypots for threat intelligence
This can help your security teams proactively discover threats and provide valuable insights into the attackers’ methods and motivations
198. Consider using an ad-blocker
To prevent tracking of your online activities and enhance your privacy
199. In emails, use CC wisely, for example to protect the recipients from ending up getting too many emails or spam
Many viruses and spam programs are nowadays able to sift through mail files and address books for email addresses
200. To check if your online accounts have been compromised, you can use the haveibeenpwned.com service
Haveibeenpwned is a trustworthy service, and you can even setup constant monitoring to be alerted of new compromises related to your email account