In this publication we will mention a few practical “Computer Security Tips” for everyone, to be applied at any time and place in our lives, either personally or at work.
Remember that many times, whether at home, on the street or at work, we usually in the name of productivity or comfort, perform activities or perform actions often at odds with good practices in terms of “Computer Security”, which in the long run, then can cause greater problems or costs for themselves or others.
However, it is precisely the integration of the necessary and vital “Information Security” measures in our personal and work activities, one of the best ways to improve our personal “productivity” or as employees, or our companies or organizations where we work.
Advice, recommendations, measures or mechanisms, which can range from simply using or discarding certain applications to ensuring that employees are safe through “Information Security” policies implemented on how to perform their activities.
Computer Security Tips
Vital
Reduce the number of security breaches
Detecting in advance and decreasing the number of “Computer Security” violations that we commit, can consume a considerable amount of time, depending on the resources we need to implement, but can save us a lot of time in the long term, because instead of spending time correcting problems presented we spend preventing their event.
Avoiding even, the consequences related to the “computer incidents”, such as to make the internal notifications and of determined law, the possible loss of clients, and even the decrease of the labor morale. A good “Cyber Security” plan guarantees that this does not happen.
Automate all possible security processes
Automating many times is synonymous with simplifying. And to simplify the processes related to the “Computer Security” within our personal or labor activities, avoids repetitive tasks susceptible to human failures.
For example, the use of “RFID technologies” or “biological scanners” such as “fingerprint readers” can facilitate and improve access to sensitive locations within facilities in a more secure manner. This avoids wasted time and leads to an increase in personal and overall productivity.
Or by automating “remote access” to certain computers or information records within them, you would prevent one person from being physically on the premises or giving confidential passwords and access codes to others.
Make good use of Internet connections
In the home or office, free and full access to the “Internet” provides access to a number of unproductive or unsafe web site sources during the productive hours of everyone who has access to it, meaning forms or mechanisms of wasted productivity hours.
Therefore, restricting access to certain sites that tend to be distracting, such as media sites, social networks, or multimedia content pages (music, movies, videos, among others) can favor the saving of large amounts of “productive time hours” of oneself or of an employee, which will surely be invested in productive hours. In addition to better use of available “bandwidth”.
Encourage the use of VPNs
Decentralization of the workforce is now a global trend, “Telework” is a booming fashion. In addition, the use of an increasing percentage of skilled foreign workers for the performance of remote services by third parties.
Therefore, the use of “VPNs” allows in an easy and safe way many to work from anywhere for any person, company or organization, public or private. Thus, a “VPN” offers access to third party resources in an invaluable way.
Have a backup or contingency plan
Every person, company or organization must have secure the vital data of their activities, which obviously must apply “backups” to have it protected.
And on the people who have access to it, the place of storage and integration with the cloud must apply the necessary measures to ensure the best assignment and definition of access and permissions on such vital data so that no unwanted access occurs.
A “data loss” not only means productivity time, but also loss of money, reputation and even customers. That’s why effective backup and disaster recovery plans help maintain “operational operations” and avoid the harsh consequences of such failures or problems.
Use two-factor authentication mechanisms
Using the “Two Factor Authentication (2FA)” technology as a “Computer Security” method, in our own activities or those of others, personal, professional or work, is an excellent mechanism, as it adds a further layer of validation, i.e. it incorporates the one that users need to take an additional step to confirm their identities before being able to access.
With the same implemented, a user needs to receive a “one0time token” on his personal or corporate phone, which must then be inserted through an application or authentication interface to obtain guaranteed access.
This technology therefore adds an “additional layer of security” quite robust in relation to the processes of penetration by others. Properly implemented, it avoids undue access to crucial and confidential information, saving headaches in the face of future consequences of “security violations”.
Keep the software platform up to date
In order for an unauthorized or unauthorized user to gain access to crucial and confidential data or information, he must first find a “vulnerability” that can explode to perform the penetration.
And precisely these vulnerabilities are generally very easy to find in previous versions of the software products used. Since only the most recent versions are the ones that have the detected bugs corrected.
This applies above all to “Operating Systems” and programs or infrastructures of critical use for organizations or users.
A good example, are the “Web Servers” which should try to have the latest versions and updates of the software used, as they are usually one of the first targets to attack by those who are engaged in such actions.
Consequently, there is nothing better than to be confident and sure that all possible security holes are minimized or eliminated within our systems.
Support
- Use strong (secure) passwords and renew them periodically to prevent easy replication. Avoid a single user and a single password for multiple services.
- Use the best possible antivirus with your latest updates.
- Implement a good firewall to protect access to the private network and encrypt the information sent over the network.
- Strengthen WiFi connections with strong passwords, hidden SSIDs, Filtering by MACs and use one for private use and another for public use. And renew passwords periodically to prevent them from replicating easily.
- Avoid connecting our personal or work devices to open networks to avoid infections, and above all do not perform sensitive operations, such as banking or commercial, on them. And only carry out this type of operations through secure and certified sites.
- Avoid as much as possible visiting or installing programs from unknown or suspicious sources.
- Configure the automatic and fastest possible blocking of our devices.
- Publish as little information as possible on social networks, especially work.
- Not to connect external devices of unknown storage to our devices, without the necessary security measures, such as using on them the antivirus before accessing them, and disabling the automatic execution (CD/DVD/USB).
- Use one or more reliable and secure ISPs to maintain the security and availability of everything.
- Avoid the loss of mobile devices or the non-custody of them for long periods of time, to avoid exposure of sensitive information.
- Be careful to download and run lightly any attachment in our emails. Especially those with flashy or fashionable names.
- To close session, to block and to turn off the equipments that are necessary to avoid intrusions not wished, or damages by electrical failures or other not foreseen. Or keep them disconnected from the Internet as much as possible.
- Periodically check the applications and extensions installed on the devices used.
- Privilege the use of Operating Systems or Software programs that are Free and Open. In case you need to use Operating Systems or proprietary or closed software programs, privilege the use of the originals with their respective paid licenses. Avoid using cracked programs or unreliable programs that violate (crack) their licenses.
Conclusion
We must bear in mind that the weakest link in the security chain is oneself, or the users of a platform or equipment. If we don’t forget it, we will already have half of the work done.
That’s why it’s vital to make everyone aware of the necessary “Computer Security” measures, which we must take individually and collectively, to protect ourselves and others, in these days of so much online insecurity.
Let’s privilege caution and scepticism in our daily walk, since a good suspicion in time can save us displeasure and, possibly, time and money. And remember, it is essential to be up to date with the emergence of new and better techniques that threaten our “Computer Security”, to try to avoid them or implement the most effective solution possible.