Don’t Need to be an IT Expert to Protect the Business: Part 2
Article by Altaf Halde, Managing Director Kaspersky Lab – South Asia
Most frequently reaction of IT support when you ask help: Have you tried to reboot your computer? A few useful recommendations to ensure you won’t need to call on IT Support and which will help to protect the company from cyber criminals.
In the first part of this article, various situations were discussed which are commonly faced by any company while dealing with Internet and digital media. The author has elaborated each and every situation and also recommended best possible solution for each one of them.
Read the first part of this article series : Don’t Need to be an IT Expert to Protect the Business
Here are the remaining important tips:
Do not forget about updates!
Cybercriminals never sleep! They are constantly seeking ways to penetrate corporate networks. Try to make sure you promptly apply updates to the operating system and the application software installed on your devices. Do not leave it until it’s too late.
Public Wi-Fi is not safe!
When using Wi-Fi in public places, try to connect only to the networks of big telecommunication companies that support protected connections. Try not to connect to unprotected or unknown private networks. With public Wi-Fi, tryto use a VPN connection wherever possible when working with corporate documents. When using the device in a public place, be careful because the people around you may see any information that is displayed, or notice the password you enter.
Be careful when placing personal or corporate information on social networking sites!
Be careful with the information you place on social networking sites. Remember that any information could become public. As for your public profile, do not place important information on your page. Do not add unknown people as friends. Check recommendations and mutual friends to make sure this is not a fraudster trying to gain your trust.
Do not let other people use the camera on your devices!
If your device is equipped with a web camera, don’t be complacent about it. A cybercriminal could get access to the camera without you being aware of it, and they do not always need special software to do it. Every time you use Skype or other communication applications enabling the camera, keep your eyes open! When you finish the conversation press the button to terminate the telecommunication session. Do not simply leave the dialog window, thinking that the communication has been disconnected. Remember that any conversation can be recorded via the camera without you being aware of it. Keep the camera covered when you are not using it and do not answer video calls from strangers.
Do not ignore the first line of individual cyber-defense!
Nobody likes using long, complex passwords on their devices, especially if they are different for each device. It is difficult to remember them all and it discourages you from changing them regularly. But this is a vital first line of defense against cybercrime. You cannot overlook the fact that a simple password makes it easier for fraudsters to access your personal and business data. The longer your password, the more reliably it protects your device against hackers and your data against theft. Your password should combine characters, figures and symbols. Do not use the same password for all devices and accounts. Try to change your passwords regularly. Do not store your passwords on the devices, especially not in an unencrypted form.
A portable device can easily be hacked, lost or stolen!
Remember, the smaller the device, the easier it is for you to lose it or leave it behind somewhere or for someone else to steal it. Always watch your devices when travelling or visiting public places. Always lock the device when your attention is elsewhere or when you have finished using it. Do not forget that a password alone cannot reliably protect your device. Use additional protection tools such as data encryption and remote control provided by security policies. If you have this in place, you will be able to remotely block your device or wipe important data should your device be lost or stolen.