Simple Changes to Improve Cybersecurity

October 3, 2016

|

Secure Halo

noun_563972In the ever-evolving world of cybersecurity, there are several simple steps you can take to improve the security of both your home and business.

It may seem obvious, but a vital strategy to cyber defense includes a simple thought: stopping and thinking for a moment before clicking a button. This idea includes using the following practices:

  • Read the notifications before clicking OK.
  • Find out how the product stores your information and what it does with your information before accepting the terms and conditions.
  • Conduct quick research on possible alternatives that might include one extra step to prevent others from gaining access to information you want protected.

Beyond being cyber aware, the first line of defense in any computer environment is a user set password.  Therefore, it is important to have a firm grasp on what you can do as an end user to ensure that your password is a strong one. Certain strategies are more obvious than others, such as increasing character length and variety to create a stronger password.  However, other password tips might not be immediately apparent, such as the four listed below.

Four Password Tips

1. Ensure that numbers related to personal information that can be easily discovered, such as birthdays or anniversary dates, are not used.

2. Come up with a system to create your own unique passwords.  For example, try using a song lyric, then a number, and then a sports team name.  This way it is both memorable and difficult to crack.

3. Enable multi-factor verification when possible.

4. Use a password manager to ensure your passwords are varied for different services.  Make sure to check how the password manager stores your passwords as well.  Do you prefer to have your passwords in the cloud or stored locally on your drive?  Both have their advantages and disadvantages.

In addition to these tips, it is important to change default passwords and settings.  Leaving the defaults in place makes attacks much easier.  For instance, routers from certain manufacturers or internet service providers will frequently use the same pattern to generate passwords.  The default credentials to view router settings once on the network is admin/admin.  This type of access gives an attacker total control over the network.  It takes a minimal amount of time to change default passwords and can be well worth it in the long run.

Like default passwords, many default settings can be harmful.  Wi-Fi Protected Setup (WPS) is a protocol that until recently was available and turned on by default on most home routers.  WPS is extremely easy to crack, but can be turned off in the router settings rather quickly.  Make sure to verify that the settings are configured appropriately.

More Best Practices

Web browsers and computers offer users a lot of different information and some of it can be easy to gloss over. However, there is one area that is important to look for when visiting random sites. Users will frequently see a small lock icon on the left hand side of the address bar in a browser window. This indicates a connection to the site via https. The importance of this connection is that the web traffic is encrypted, which makes it more difficult for attackers to view the information sent and received. Be sure to check for this when entering confidential information. A lack of this encryption can be a giveaway for fraudulent websites.

Be sure to update applications and operating systems on a regular basis.  Most updates are for security improvements and bug fixes.  Release notes are a quick way to gain a greater understanding of why the update is needed.

There are many other more technical methods to improve cybersecurity practices, but the guidelines listed above are simple ways to create a safer and stronger cyber environment with little effort. Being more aware of potential threats as individuals will not only lead to a better personal defense, but also to a stronger impact on workplaces as a whole.

You May Also Like…

Top 5 Cyber Threats to Business

Top 5 Cyber Threats to Business

Top 5 Cyber Threats to Business With the ever-growing digital age, cyber crime is on a constant rise, and no one seems...

Cyber’s Gender Gap

Cyber’s Gender Gap

Cyber's Gender Gap Cybersecurity and Information Technology holds a reputation for being a field of study continuously...