7 Security Habits of Highly Effective PC Users used with permission from HP Technology at Work You might not think about it when you€re browsing the web, shopping online and interacting on social media, but you are the first line of defense against cyber security risks. The power to be safe is in your hands and at your fingertips. Developing and maintaining good habits can make online activity much safer and more enjoyable for you and your colleagues. The following 7 good habits take only minutes to learn and are easy enough to incorporate into your daily work life. 1. Create strong passwords Passwords are usually the first, and sometimes only, protection against unauthorized access. They are the keys to your online kingdom, so keep these guidelines in mind. Many websites will let you know whether your password is safe when you€re in the process of creating it. Pay attention to that, and if the site indicates that your password is weak or not secure, create a better one.
2. Lock your computer screen You never know who might use your computer when you€re not around, so it€s important to lock your screen to prevent unauthorized access. In the office, a co-worker, guest or a service provider might view or use your unattended computer. This is an easy way for private information to become public. It only takes a few seconds to lock your PC. Just press the Ctrl+Alt+Delete keys and then select the option €Lock this computer.€ For your smartphones and tablets, use the passcode feature, as these devices are just as vulnerable as your PC. 3. Secure mobile devices from loss While mobile devices such as smartphones, tablets and laptops are valued for their portability, this convenience can become a security risk. It€s easy to lose or misplace these devices, so be sure to:
Mobile devices and removable media, such as USB drives, enable us to easily share and transport information, but can lead to the loss or misuse of data. Although it€s important to protect the actual devices themselves from loss, it€s equally important to protect the information they contain by:
Simply stated: think before you click. A malicious website that looks legitimate is a common method used by criminals. However, verifying the real destination is easy€just place your cursor over the displayed URL, and the true destination will reveal itself with a small pop-up. Don€t click if it looks suspicious. For URL shorteners like tinyurl.com and bit.ly, simply add a plus sign (+) to the end of the URL to display its true source. For QR codes, choose a reader app that allows you to preview the destination before opening the link. And when it comes to mobile apps and software, download from a trusted source, like Google Play, Microsoft.com or Java.com. 6. Use public Wi-Fi safely Public Wi-Fi is riskier than corporate or home Wi-Fi because you can€t determine its setup and security features. So, take extra precautions when using it.
Social media provides a convenient, fun way to stay in touch with friends and family. But be cautious about what you post. Understand both personal and business risks, and take the following precautions:
Bad habits might die hard, but good habits can protect you from cyber threats. You are the first line of defense in protecting yourself, your colleagues and your devices against security risks. And as criminal methods and tactics are becoming more advanced, it€s more important than ever to establish and maintain good security habits. Databranch can help your business develop a security solution that can keep your network safe from internal and external security threats. If you would like to learn more, please call us today to speak with an Account Manager or visit us at http://www.databranch.com/security-services.
|