The protection of our personal computers has become increasingly important.
Check Point Software Technologies, one of the largest cybersecurity companies, has published five tips to provide guidance and assistance in protecting both our personal devices and corporate IT systems:
– Passwords are important: Passwords should be checked and strengthened regularly. However, experts disagree on the length and composition as well as the frequency of renewal. It is important for users to handle passwords carefully, not to store them unsecured in Excel spreadsheets, not to write them down in notebooks that anyone could find, or to stick them on the back of the keyboard. “1234” or “password” are not secure passwords.
– Phishing protection: Users should be careful before clicking on links that look suspicious in any way, especially as far as the sender is concerned. They should also download content only from trusted sources, as phishing, a popular form of social engineering, has become the main means of attack. Therefore, if users receive an email with an unusual request, strange sender, or even subject, they should treat it with suspicion.
– Choose your IT devices carefully: Especially now with remote work, this is extremely important. The risk of large-scale attack increases when employees use their personal devices, such as computers or cell phones, for work-related purposes. Security software should be installed on all devices and the connection to the company network should be protected.
– Keep your software up to date: Hackers often find access points to applications, operating systems, and security solutions, as they generally monitor and exploit any vulnerabilities. One of the best protection measures is to always use the latest version of any software – simple, basic but effective.
– Use multi-factor authentication: A process that many users are familiar with from their online bank accounts, for example when requesting an OTP (one-time-password) via mobile phone. In many cases, this connection method is now being introduced for applications and online retailer accounts to increase IT security. In this way, they have made it almost impossible for cybercriminals to gain access to the system despite knowing the password.
These tips already go a long way in protecting your own devices and your company from cyber attacks and malware. However, according to Check Point, they should also be complemented by an integrated IT security architecture that centrally integrates and controls multiple solutions against different types of attacks.