The Weakness Within
Cybersecurity events are commonly perceived to be caused by external cyber-attacks; however, the most common vulnerabilities and attacks are found within the organization, thus initiated by lack of personnel training, intentional, and unintentional negligence. Appropriate training, awareness, and implementation of appropriate policies will support a safer business environment.
Despite our complex knowledge of Cybersecurity, often we tend to forget the basics, and take our “safe environment” for granted. The following safety guidelines provide how to take the same precautions on our mobile device as we would do on our co
mputer with regard to messaging and online safety.
- Keep a Clean Machine and up-to-date:
- Keep security software current: Having the latest mobile security software, web browser, and operating system are the best defenses against viruses, malware and other online threats.
- Back Up Your Data
- Protect all devices that connect to the Internet: Computers, smartphones, gaming systems and other web-enabled devices all need protection from viruses and malware.
- Protect Your Personal Information:
- Secure your phone: Use a strong passcode to lock your phone.
- Only give your mobile number out to people you know and trust and never give anyone else’s number out without their permission.
- Consider disabling the geotagging feature on your phone.
- Store all passwords in a secure location
- Store security questions
- Connect with Care:
- Use caution when choosing to connect
- Do not auto-connect
- Avoid accessing banking or secure/sensitive information
- Avoid checking email
- Avoid making purchases
- Be Web Wise:
- Stay informed of the latest updates on your device. Know what to do if something goes wrong.
- Use good judgment:
- It is easy to say things via phone or text message that we would never say face to face. Remind ourselves to maintain the same level of courtesy online as we would in the real world.
For more information on personal cybersecurity protection watch this webinar: http://www.nationalcybersecurityinstitute.org/podcasts-webinars/personal-and-physical-security/