Easy ways to protect your privacy and data
Posted on 11 January 2012.
In spite of one high profile computer security breach after another, many people are still not employing even the most basic safeguards to protect their privacy and their data. Defence Intelligence has created the following seven computer security resolutions to help people protect their privacy, their data, and their wallets.

Stay up to date
  • Keep everything updated. Your operating system, your web browser, anti-virus, Acrobat, Java, everything.
  • Set programs to automatically update so itís not as annoying.
  • Before randomly clicking the ďupdateĒ button, be sure you recognize the program and it looks legitimate. If in doubt about an update pop up, open the program itself and update from there.
Improve your passwords
  • Stop using the same password in multiple places. Unless itís a throwaway account that you care nothing about, have a unique password for everything you do.
  • Strengthen your passwords by adding numbers, symbols and capital letters. Try using phrases instead of a single word.
  • Do not store your passwords in your browser.
Check your messages
  • If you donít know who the email is from, donít open it.
  • Turn off the preview feature in your email program. Some malware can be executed simply by being opened in the preview pane.
  • Donít click on links in received emails. These can be faked and may lead you to bad places. Copy the address and then paste it in your browser instead.
  • Donít open any attachments that you arenít expecting. If itís from a friend, check with them to verify that they sent it.
  • Donít forward forwards.
Know your friends
  • Donít add ďfriendsĒ that you donít know.
  • Keep your friend list up to date. If youíre not sure who the ďfriendsĒ on your contact list are, delete them.
  • Before clicking on any links or files sent to you, verify that your friend intended to send them to you.
Secure your mobile devices
  • Require a password to unlock your phone or tablet and keep it locked when not in use.
  • Donít store anything on your mobile that you arenít comfortable losing.
  • Ensure that your device does not connect automatically to open Wi-Fi networks.
  • Install an application capable of locking down and erasing your device in the event it is lost or stolen.
Watch what you click
  • Be wary of third party applications available for your phone, facebook, etc. If you donít need it, donít install it.
  • Donít click on shortened links on Twitter or elsewhere. You have no idea where you might end up. To see where these links lead to, use a service like http://www.longurl.com or http://www.unfurlr.com.
Share with care
  • Whatever you share online will remain online. Once itís out there, there is no way to remove it.
  • Treat email like a postcard - potentially visible to all.
  • Donít insert random USB keys into your computer - you donít know where theyíve been or what they may contain.





Spotlight

What can we learn from the top 10 biggest data breaches?

Posted on 21 August 2014.  |  Here's a list of the top 10 biggest data breaches of the last five years. It identifies the cause of each breach as well as the resulting financial and reputation damage suffered by each company.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //