77 Cybersecurity Tips to Implement This Week

Published on May 25, 2020  |  Cyberfort Advisors

You likely use internet-connected devices for work and play, so it’s important to implement cybersecurity measures for both. 

If you are in charge of an IT team at work, these tips will remind you of the best practices that your organization needs to follow. 

If you have any personal devices, these tips will provide you with general cybersecurity guidance.

No matter how many devices you manage, be sure to partner with a cybersecurity professional to determine the best software solutions based on your needs and to fine-tune your security measures on a consistent basis. 

Basic security for most devices and accounts

  1. Use antivirus protection on all of your devices (yes, even your phone)
  2. Use a firewall
  3. Turn on automatic updates for all apps, software, and operating systems
  4. Never share passwords
  5. Use multi-factor authentication for accounts that contain sensitive information
  6. Use complex passwords
  7. Never reuse passwords; instead, have a unique password for every account
  8. Update passwords every 90 days
  9. Use a password manager
  10. Remove browser extensions and plugins you no longer use
  11. Create multiple users for your devices; one admin for maintenance and other users for daily use
  12. Use public WiFi connections safely
  13. Use a VPN when in public
  14. Avoid using devices that belong to other people
  15. Frequently back up data to the cloud (yes, even your phone data)
  16. Shop in trusted online stores
  17. Don’t allow online stores to save your billing information
  18. Log out of online accounts after completing a purchase
  19. Keep a record of your online purchases and compare it with your banking records
  20. Check your financial accounts frequently to ensure your accounts have not been hacked
  21. Use websites that start with “https” when providing sensitive information
  22. Never leave your devices unattended
  23. Use secured IP cameras for smart devices
  24. Disconnect your computer from the Internet when you aren’t using it
  25. Never put an unknown USB into your computer
  26. Be aware of malvertising (instead of clicking on ads, open a new tab and search for that brand to purchase an item)
  27. Consider an ad blocker
  28. Cover your webcam when you’re not using it
  29. Disable Adobe Flash
  30. Disable Internet Explorer (Microsoft hasn’t updated it since 2016)
  31. Never use unsupported software
  32. Keep your browsers updated
  33. Disable macros in Office files
  34. Perform a Google security checkup
  35. If your account gets hacked, update your password and enable two-factor authorization; then repeat for other accounts that account is connected to
  36. Choose the right service provider
  37. Turn off personalized ads in Google
  38. Don’t save sensitive data, such as social security numbers, credit card information, and health information on any device

Avoid malware by following email security best practices.

Email security

  1. Never click on email or SMS links from an unknown sender
  2. Double-check an email sender’s email address before clicking a link or downloading an attachment within the email
  3. Never click on links in spam emails
  4. Never download or open attachments in spam emails
  5. Mark spammy emails as spam to notify your email provider
  6. Have separate email accounts for work, shopping, financial information, etc.
  7. Don’t use your work email for personal purposes
  8. Check for misspellings in emails; they can indicate spam
  9. Don’t reveal too much information in your out-of-office auto-responder emails
  10. Don’t share your email address online; only share it with people you trust
  11. Don’t respond to spam emails

Facebook Privacy Basics

Safe on social media

  1. Never accept a friend request from someone you don’t know in real life
  2. Update your privacy settings on social media so the general public cannot view your posts
  3. Report fake social profiles
  4. Avoid real-time “checking in” as it can reveal your home address or vacation plans
  5. Monitor all social media accounts periodically
  6. Check activity logs for all accounts; terminate old sessions where you used someone else’s device or if you see a session that you didn’t initiate
  7. Be careful what you share about your children on social media
  8. Remove geotags from past social media posts
  9. Turn on security notifications for messaging apps
  10. Start a Facebook security check
  11. Make your social media accounts private
  12. Be wary of giving third-party apps access to your social media accounts; revoke access from unused apps on a consistent basis
  13. Delete accounts and apps you haven’t used in the past 6 months
  14. Don’t respond to messages from people you don’t know
  15. If a friend sends you an odd message or a second friend request, confirm the request with them through another avenue, such as in-person or email, to validate that it’s not a scam
  16. Don’t click on a link within a suspicious message or post, even if it’s from a friend; their account could be infected

Having a passcode is important for phone security.

Phone security

  1. Turn on your screen lock for your phone and always use it
  2. Turn off your Bluetooth connectivity when you’re not using it
  3. Never download an app from an untrusted source
  4. Review the permissions of apps before you download them
  5. Turn on the auto-lock feature on your mobile phone
  6. Turn on your phone’s tracking solution e.g. Find My iPhone or Android Device Manager
  7. Before selling or giving away a phone, complete a Factory Data Reset
  8. Manage your Google Voice and Audio activity
  9. Disable auto connectivity for Bluetooth, WiFi, and more
  10. Be suspicious of phone numbers from random numbers; be sure to block numbers that are clearly scams
  11. Avoid sending sensitive information via text
  12. Remove sensitive information from your phone, encrypt it, or require a passcode to access it

This is not an exhaustive cybersecurity checklist, but it is a great place to start for your business and personal cybersecurity needs. These basic actions can help protect your sensitive data. 

If this list is overwhelming, start by updating your passwords and purchasing antivirus protection for all of your devices.

Do you have the right antivirus protection?

LEARN MORE >

CyberFort Services

We offer a complete suite of consulting services to help you create an effective strategy that resolves threat, security and regulatory compliance risks efficiently.

LEARN MORE >

Industries Served

Our team of industry recognized subject matter experts work to offer the right security solutions for your specific needs, preventing threats and vulnerabilities from compromising your business.

LEARN MORE >

Ready to secure your business against cybercrime?

Establish a complete cybersecurity program for your business with smart strategies, solutions and support by CyberFort.

Your Guide To A Successful Cybersecurity Overhaul by CyberFort Advisors

Your Guide To A Successful Cybersecurity Overhaul

Many companies implement new cybersecurity policies and procedures, but they ignore one critical fact: When it comes to your cybersecurity posture, your end-users are your weakest link.

Without getting employees and other end-users on board, your company data is at risk.

With your end-users on board, how do you deploy new cybersecurity policies? There are many pitfalls companies commonly fall for during this process. With the right preparation and guide, you can overhaul and deploy a successful cybersecurity initiative.

This short but comprehensive guide will show you how to:

  • Overhaul your cybersecurity program
  • Get your employees and other end-users on board
  • Avoid common pitfalls that cause cybersecurity initiatives to fail

To download the guide, please provide us with your name and email address:

Thank you for your submission! You will receive an email with a download link.