10 Ways to Keep IT Systems Secure
https://www.entrepreneur.com/article/219954
1. Protect with passwords.
2. Design safe systems.
3. Conduct screening and background checks.
4. Provide basic training.
5. Avoid unknown email attachments.
6. Hang up and call back.
7. Think before clicking.
8. Use a virus scanner, and keep all software up-to-date
9. Keep sensitive data out of the cloud.
10. Stay paranoid
Cybersecurity Awareness: Your Checkup Checklist:
1. Is your computer up to date?
2. Is your mobile device secure?
3. Are you suspicious of unsolicited emails or texts?
4. Let’s talk passwords.
5. Are your social media habits putting you at risk for identity theft?
6. What about your apps?
G-Mail Security
Protect against suspicious messages & content (Via Google).
Avoid suspicious requests
· Never give out your passwords. Google will never ask for your password in an email, message, or phone call.
· Don’t reply to suspicious emails, texts, instant messages, webpages, or phone calls that ask for your personal or financial info.
· Don’t click links in emails, messages, webpages, or pop-ups from untrustworthy websites or senders.
Avoid suspicious emails
Gmailis designed to help protect your account by automatically identifying suspicious emails. You can also use these tips to help you identify suspicious emails and settings:
· Check if a Gmail message might be fake.
· See if the email address and the sender name matches.
· If you get a suspicious email in Gmail, report spam or phishing to help stop similar emails in the future.
· Check your Gmail Settingsto make sure there’s no unfamiliar activity.
Tip: If you're using Gmail on your computer, point to a link without clicking on it. At the bottom left, look at the web address and make sure it's what you expect.
Avoid suspicious web pages
Google Chrome and Search are designed to warn you about suspicious content and unwanted software.
Learn how to manage these warnings in Chrome and Search.
Digital Defense
· Use of strategies to ensure digital security. Protection of confidential electronic information by taking a few steps such as setting up a firewall and installing and scanning computers for malware, viruses, Trojan horses and spyware
Five (5) Shocking new threats to your personal data
· Do not include your fingers in your selfie that you post online
· Do not post private information online like phone numbers, address, etc.
· Beware of social engineering tactics which others use to get you to give them your personal information
· Beware of mobile apps that collects personal information about you 5. Don't get into heated arguments with trolls, haters or political extremists online.
Understanding Security Threats
· Computer security protects your network and computer
· Data loss prevention plan reduces risks
· Various threats from Malware
· Several sources for threats
Types of Risks
· Risks include cybercrimes, such as hacking, identity theft, malware, spam messages, and viruses. Antivirus software offers some protection, but it is not foolproof and can even promote a false sense of safety. In many instances, antivirus software can be disabled because a particular virus targets the software itself using increasingly sophisticated methods.
Components of Security
· Physical Security: Are the physical devices locked up? Are the network cables exposed?
· Digital Security: Is the electronic information protected?
· Privacy Policies: What happens when the information is viewed
Understanding Malware
· Malicious Software installs itself on the computer
· Results include pop-ups, viruses, or tracking
· Malware includes: viruses, Trojans, Macro viruses and logic bombs, rootkits, spyware, and adware
Mobile Device
· Device security focuses on the security settings of your mobile devices. There are a number of device concepts and features that you should know, including Full device encryption, Remote wiping, Lockout, Screen-locks, GPS, Application control, Storage segmentation, Asset tracking, Inventory control, Mobile device management, Device access control, Removable storage, and Disabling unused features
7 Ways to Protect Your Privacy Online
· Delete Cookies: The first step towards protecting your privacy online is to delete “cookies” from your browser, says Paul Stephens, director of policy and advocacy at the Privacy Rights Clearinghouse. Cookies let websites collect information about what else you do online. Most browsers have privacy settings that let you block third-party cookies. But it’s not fool proof. Stephens warns that trackers are now switching from cookies to a new kind of targeting called fingerprinting, which is much harder to avoid.
· Log Out of Social Media Sites While You Browse the WebAnother simple strategy, says Stephens, is to use different browsers for different online services. That will limit how much information any one site can collect about your web activity. For example, he says, “don’t go to a shopping site while you are logged in to Facebook.”
· Change Your Smartphone’s Privacy Settings Advertisers can also track you when you’re browsing the web on your mobile device, warns Gautam Hans, attorney at the Center for Democracy and Technology. You can change the privacy settings on your iPhone or Android device to limit ad tracking.
· Skip Store Loyalty Cards Data brokers collect information from the real world too, Hans says. It’s impossible to limit brokers’ access to some kinds of personal information, like public records. But if privacy is really important to you, decline offers for store loyalty cards–a major way retailers gather information about your buying habits. The downside? You may miss out on discounts.
· Employ Advanced Online Tools For the especially privacy-conscious, there are a number of online tools that can ratchet up your defenses. Some browser add-ons, like Disconnect.me, help you see and block tracking requests as you spend time online. Instead of Google, you can try the DuckDuckGo search engine, which promises not to collect or share personal information. Or use the browser Tor, which lets you go online anonymously. But these extra measures may not be a good fit for everyone. Some websites don’t load properly when you use anonymous browsing, Hans notes.
· Opt-out of Data Broker Collection—Whenever Possible Ultimately, it’s difficult to get data brokers to stop collecting information about you, or even find out how much information brokers already have. The FTC concluded that to date, “consumer opt-out requests may not be completely effective.” But one major data broker made waves last year when it launched a portal that allows you to access your data and opt-out of certain services. Check AboutTheData.com to see what information Acxiom has stored on you.
· Do a Digital Check-up Many popular sites like Facebook, Amazon, and Twitter offer privacy controls, so use them. Every once in a while, check your settings and see if you’re happy with how you are limiting the ways your data is used. “What’s important is that people have the opportunity to meaningfully consent,” Hans says.
· Source: http://time.com/money/2819049/data-brokers-online-privacy-tools/
Other ways to stay protected online
· Use VPN when possible
· Encrypt your data online
· Use strong passwords
· Be aware of social engineering
· Regular update (OS and anti virus software)
· Understand phishing tactics
The best and free ways to encrypt your data
http://www.howtogeek.com/135638/the-best-free-ways-to-send-encrypted-email-and-secure-messages/
Privacy Settings
· 5 privacy settings you should change in Windows 10
https://www.cnet.com/how-to/5-privacy-settings-to-change-in-windows-10
Prevent Your Accounts From Being Hacked
· Provide a secondary email address for recovery.
· Provide a phone number for password recovery.
· Turn on 2 Factor Authentication.
See more details at the link below
http://techguylabs.com/blog/prevent-your-accounts-being-hacked
Kiddle (Safe Search Engine for kids)
· Kiddle is a visual search engine for kids powered by Google, offering safe kids web, image, and videosearch. Results are vetted by editors.
10 Key Information Security Mistakes Organizations Make! How to Fix Them?