7 Security Best Practices

In: Security
0 Comments

The news is right, there are more and more companies that have been compromised by cyberattack. Companies of all sizes and verticals are targets, not just the big companies. Individuals are also targets.

Having the proper security controls is imperative for mitigating threats, but that needs to be supplemented by good old common sense. Below are a few things that YOU can do to help protect yourself:

Have a good password. These standards have changed repeatedly over the years. The general consensus now is that longer is better. Using a long passphrase is more secure than using a shorter complex password… but mix up your passphrase with a few special characters to make sure that it cannot be cracked using dictionary attacks. Consider song lyrics or movie quotes, and then change them up a little. Remember longer is better. Have fun with it!

Don’t reuse passwords. The problem is, as fun as long passphrase are, it is still difficult to remember a unique password for every application and service.

Use a password manager to remember all those passwords. Most password managers integrate with cell phones and browsers and auto fill the password for you. I don’t recommend using the ones that come with web browsers or with operating systems. Make sure your password manager master password is a very secure password, and I highly recommend enabling multi-factor authentication. Speaking of which…

 

free-vector-online-identification-illustration

 

Use multi-factor authentication anywhere possible! Nearly every cloud application has the ability to use Multi-Factor authentication.

Think before you click! See something interesting in an email or on a web page? Consider that it might be malicious before you click it. Be leery.

Call to verify a questionable email. Believe it or not, human being do still occasionally communicate using telephones. If you get an email that looks sketchy, call the sender and ask if

they really sent it.

Don’t talk to strangers. Get an alarming email, but don’t know who it’s from? If it looks questionable, and you don’t know who it’s from, just don’t open it.

Lock your screen! Visitors come through offices frequently. If you don’t lock your screen, then you may have a surprise waiting for you when you get back.

Developing an Information Security Strategy

Tags: Security

Written by Jason Dell

Jason Dell – Network Solutions, Inc. Lead Security Engineer Before joining Network Solutions in 2002 Jason worked in the healthcare field for thirteen years. Jason has experience in routing and switching, wireless, and IP telephony technologies, and specializes in the areas of IT security and network management. Jason is skilled at implementing complex projects for customers in a wide variety of vertical markets, including automotive, healthcare, manufacturing, government, banking, K12 and colleges/universities.

Leave a Reply

    Related Post