31 TIPS | 31 DAYS OF COMPUTER SECURITY AWARENESS TRAINING FOR YOUR EMPLOYEES – 2020

31 tips

31 TIPS | COMPUTER SECURITY AWARENESS TRAINING 

PASSWORDS

Using three random words is an effective way to protect your data compared to a common word or sequence of numbers. Choose three random words, add random numbers and symbols; and your password will be much more secure. 

CONFIGURE MFA

Multi-factor authentication MFA is an authentication method that requires two or more verification factors to gain access to an application, online account, or a VPN. 

ATTACHED FILES

Almost any type of data file you can attach to an email message can be used for email phishing attacks. Unfortunately, this functionality creates an opportunity for malware distribution. Opening them can easily infect your computer. Remind your employees to be very careful when opening attachments

PHISHING TESTS

Do you think you can outwit Internet scammers? How good are you at differentiating between a legitimate website and one that is a phishing attempt? Put your knowledge to the test! 

PUBLIC Wi-Fi

There are several risks that accompany public Wi-Fi networks. Business owners may believe that they are providing a valuable service to their customers, but security on these networks is likely non-existent. Perform penetration tests on these Wi-Fi networks to see if they really are secure. 

DATA VIOLATIONS

Data breaches happen frequently, for businesses and individuals alike, and can have a devastating impact. By becoming more aware of cyber problems, you can identify threats before they become a bigger problem. Learn to take care of your confidential information on social media. 

OFFICIAL APPLICATIONS

Make sure your applications are legitimate. PLEASE download your mobile apps from the App Store and not from websites that offer “free apps”. Do not use search engines or a link from someone you barely know to download apps. 

NETWORK SECURITY

Security threats are constantly evolving, so you need to keep your browser and operating system up to date.  Updates help protect you from viruses and attacks. The lack of an update can have serious consequences for the security of your company. 

WEBCAMS

The number of reported cases of hackers gaining access to webcams continues to rise. You can better protect your privacy by covering your webcam when you are not using it. 

LINKS

By clicking on an unknown link, you may be directed to a fake website that appears legitimate. You may be asked to provide personal data. If you do this thinking that it is a genuine site, the scammers may carry out a fraudulent transaction. 

SOCIAL NETWORKS

Hackers set up fake profiles on fake accounts using photos they find on the Internet and use them in associated engineering attacks. Only accept contacts that you know when using your social networks. 

UPDATE YOUR BROWSER

Outdated search engines can have serious security problems. By running older web browsers, you are exposing your security because these browsers do not have the appropriate security patches. Update your search engines. 

LOCK DEVICES

Leaving your devices unlocked is like leaving your car running with the keys in and the doors open. Anyone can access their private information with a quick swipe or the push of a button. 

DISABLE THE AUTOMATIC CONNECTION

Connecting to an open Wi-Fi network can expose your device to security risks. Although it is generally not enabled by default, most devices have settings that allow connections to start automatically without notifying you. 

CLEAN UP YOUR APPS

Simply put, by removing old files and apps from your phone, you are freeing up space, which can help you keep your operating system and the apps you want to keep up to date. 

DATA BACKUP

Backup is essential for data protection. A weekly backup saves your important files from unavoidable data loss situations such as system crashes, malware, ransomware, and hard drive corruption. 

FRAUD

Cyber ​​fraud remains the most common type of fraud, in which a fraudster can access a person’s financial information and use it online to finance himself or for other criminal activity. Take care of your personal information. 

UPDATE ANTIVIRUS

Keeping your antivirus updated is essential; This will protect your devices from the latest threats. Make it a habit to periodically apply available updates. 

ONLINE BANK

While online banking has made it easier to interact with our bank assets, scammers and cybercriminals have also developed new attack techniques. Make sure you keep your money in your bank account and out of the pockets of criminals. 

RECOVERY INFORMATION

The recovery phone number and/or email help you reset your password if you forget it, if someone else has gained unauthorized access, or if your account is locked for other reasons. 

LOCATION SERVICES

You know that your phone keeps track of all the places you go, all the time. You can turn off this function if you want. 

AUDIT EMAIL ACCOUNTS

Email security is something that can often fall by the wayside but acting and checking your email settings is not complicated to help avoid a messy situation. 

USE A VPN

A virtual private network (VPN) allows you to create a secure connection to another network over the Internet. VPNs can be used to hide your browsing activity on public Wi-Fi networks and more. 

DELETE YOUR COOKIES

There are several reasons why you should consider removing cookies from your browser. They pose a security threat, as hackers can hijack cookies and gain access to browser sessions to steal personal data. 

CYBER HYGIENE

Files become fragmented and programs become obsolete, increasing the risk of vulnerabilities. Safety is one of the most important reasons to incorporate a cyber hygiene routine into your life! 

SOCIAL NETWORK BLOCKING

Ensure social media safety within your organization and create a detailed social media policy. Check and modify the privacy settings to maximize the security of your digital profile. 

CLEAN UP YOUR DIGITAL LIFE

Outdated profiles are signs of a security breach that is about to occur. 

BE AWARE OF SCAMS

Keep in mind, if it sounds too good to be true, it usually is! Delete that phishing email and report it to your IT department. 

DISCONNECT!

Leaving your devices connected all the time is a risk. Hackers constantly exploit technology to commit crimes, such as accessing private information and spreading malicious software. 

CREATE YOUR OWN SAFETY PLAN

Get started and identify all the types of sensitive data you store, define where that information is stored, and record all hardware and software devices on your network. 

SHARE KNOWLEDGE!

Keep practicing cyber hygiene and help others stay safe too. Why not share all these helpful tips with friends, family, and colleagues? 

Remember the 31 tips and you will safe. 

 

https://www.reddefenseglobal.com/security-awareness-training

https://seguridad-ofensiva.com/entrenamiento-y-capacitacion