You have to be very careful with the use that is given to the devices and with the information that is consulted and shared, among other things.
The holidays have already begun. For those who have left them for August, it is already a good time to review the list and make sure you have everything ready: the flight, the hotel, the swimsuit, the flip-flops, a good list of places to visit, the restaurants you want to go to for dinner, unlimited plans with family and friends, and more.
However, for these days of rest to pass in the best possible way, the user must take precautions. And not only when it comes to travel but also when browsing the Internet. So that you don’t make mistakes, we have collected ten tips that can help you during and after summer trips.
In most workplaces, your security or IT department probably already takes care of doing backups automatically. If you need to learn the backup policy, you might feel better creating a personal backup of essential files yourself.
Although tools can automate this process, you can copy all the files and documents stored in specific folders on your computer to another computer to make a one-time backup. Backups need to be kept remotely, not locally, so an easy way to do this is to simply transfer a copy of these files to a USB storage device.
That way, when you come back, you’ll be sure to return all your files to precisely the same state you left them in, in case something goes wrong while you’re away.
Nowadays, many of us always leave our homes and work on computers. It is faster and easier to have them prepared. However, turn them off if you won’t need to connect to them remotely during the holidays. When a computer is on, it is also online and, therefore, open to attack (depending on the protections you have in place).
If it’s off, they can’t hack it. If you will not use it for several days or weeks, why not turn it off to avoid any possible attack? In the case of IoT monitoring equipment, such as cameras, logically, you should leave them on so that they can continue to work while you are not there, but if you do not need them, turn them off.
If you don’t update your software as recommended, you can leave the door open to vulnerabilities. Before you go on vacation, perform any pending system updates, and as soon as you return, be sure to review and apply any that may be pending. Again, the IT department typically has processes or tools in place that force and automate updates. In that case, you don’t have to do anything. However, these automated solutions sometimes ask the local user if they can update and restart the Computer at a particular time. So make sure you authorize the updates before you go.
Cybercriminals are still on the prowl despite it being summer, and you could be phishing anytime. Beware if you get a suspicious email about an urgent password change, a payment to a vendor that can’t wait, or anything else strange and suspicious! It may be a scam even if it comes from a known contact. Check the sender’s address, and if in doubt, don’t open the message or reply.
The hotel or apartment where you vacation probably has a public WiFi network. If you need to access email or company documents while on vacation, avoid using a public network if possible. At the very least, try to use a WiFi network with a password to offer essential protection from the general public.
Currently, with remote work, security departments do not entirely prohibit the use of public networks; however, they impose some requirements for their use. If you are going to connect to a private or public WiFi network over which neither you nor your company has control, you must have a set of protections on your computer, such as an antivirus. Always use a VPN to provide an extra layer of encryption to your connection so that other users on this public network cannot intercept your email and other services.
You can download a game or app to edit your vacation photos and videos during your free time. Be very careful if you use the same device for entertainment and to access company email or applications. Malicious apps can access all the data on your phone, including company data, and you could face a cyberattack. If you want to download an app, do so only from known sources and repositories. For example, download apps only from official Apple or Google stores on mobile devices.
You can also download them for computers through the Microsoft, Google or Apple app stores. Most problems with malicious apps occur when downloading content from unofficial sources. Don’t pirate, either. As well as being illegal in most countries, few things are free, and many pirated apps include ‘malware ‘, i.e. malicious code.
It provides the minimum information necessary to accomplish the task, nothing more. Be bold and ask what will use the requested information will use the requested information for. Is it necessary to facilitate the digitization of the passport or credit cards? Do you have to take note of the credit card number, expiration date and security code (CVV number) after successful payment? Before revealing personal information, you want to keep safe, be aware of the consequences.
Although not directly a cybersecurity measure, the fewer details we reveal about the vacation, the better. We must know that published information can haunt us in many unforeseen ways. Physical thieves can use this information to attack your home, but social engineers can use this knowledge to craft an even better, more personalized email that triggers a cyberattack.
USB infections are still common despite being an old hacking technique. Avoid at all costs connecting a USB that you have found.
Attackers have several ways to steal your passwords. They may have been stolen from you through a ‘phishing’ attack. It could also be that they have ‘hacked’ a site you access and obtained the password from there. This is a problem if you use the same password in other places. Malware can also steal passwords. However, two-factor authentication can save you, even when an attacker knows your password.
This functionality means that every time someone tries to log into your account, they will also need a second authentication factor (such as approving a notification on their mobile phone) to log into your account. This makes it much more difficult to ‘hack’ accounts, even if attackers steal your credentials. Best of all, you get a notice that they’re trying to gain unauthorized access to one of your services.
Drawing:acotuuvra54= harry potter is related to a Harry Potter character art; you can also call…
In this article, we explain what long-tail keywords are and why it is important to…
New Meta updates have arrived that will transform the way we manage and optimize advertising…
Amazon is the most visited marketplace worldwide, standing out from its competitors in terms of…
Although Discovery campaigns on Google Ads have been running for a few years now, we…
Microsoft Advertising is Microsoft's SEM tool that allows you to place text ads on search…