10 Embarrassing Cyber Security Faux Pas You Better Not Make

 

It is now more essential than ever to ensure you are using the internet in a safe manner to protect yourself as well as your employers from cyberattacks. The mistakes made by individuals are the leading causes of security breaches. An analysis of the 2019 breach reports submitted by the United Kingdom’s Information Commissioner’s Office (ICO) found that 90 percent of data breaches are caused by an error in cyber security. This is a significant number of expensive errors.

In concern of Computer Security 2022, we have compiled a list of the rules of cyber security that all users should be aware of to be safe and avoid data security breaches.

Must Know about CISO?

A CISO (also known as the Chief Information Security Officer, is the highest-ranking officer within an organization. They are responsible to ensure that the organization has the right cybersecurity safeguards in place and is doing the best they can to avoid cyberattacks or have a plan in place to address the possibility of them taking place. They are also accountable for making sure that each employee is aware of their cybersecurity obligations and the best ways of avoiding making a security error. The 10 guidelines below are only a handful of things they would like you to be aware of.

The best guidelines to observe to prevent falling victim to a cyber security blunder.

 

  1. Learn to spot the indicators of a fraudulent email.

Over 3 billion fraudulent messages are sent to people around the world each day, so it is likely that you get them often. Even if you still get an email from an alleged Nigerian prince requesting cash in exchange for his unending devotion however, the majority of phishing emails are much more sophisticated. They employ branding and phrases that are directly derived from official entities. This scam that was reported earlier in the summer to convince the person receiving them that they’re genuine, increasing the chances of being successful.

The purpose in these email messages is to deceive the recipient into making a security error by giving the hackers your personal data in order to gain get access to your accounts. Be sure to keep your email secure:

  • Be wary of opening an email if it’s suspicious
  • Be wary of opening attachments or links in emails that are not from you.
  • Verify that the sender is authentic – verify whether the email address is authentic
  • Don’t respond to unsolicited email
  • Never divulge sensitive information, like your personal information, credit card number or account passwords by emails to people you do not already know.
  • Send suspicious emails to your IT security agent
  • Know the indicators of a fake email:
    • Grammar or spelling errors are not correct in the email
    • Incorrect textual elements that don’t match up
    • Sender email addresses that look odd that have random letters and numbers instead of names and words
    • Domain names hidden from view, and short URLs
  1. Create strong passwords

Poor passwords are among the most frequent cyber security mistakes that can lead to data breach. Cybercriminals have a range of methods to gain access of passwords, including obtaining details from scams involving phishing, and also buying stolen passwords. They are also quite adept at predicting passwords, particularly when they use obscure passwords like ‘password’ or “123456”.

Here are some helpful tips for making strong passwords:

  • Utilize greater than eight characters. Use three random words. Use the three words randomly rule to generate lengthy passwords which are simple to remember.
  • Make your own character – include characters inside words, or create your own concepts and words
  • Always change your passwords from an initial password that somebody else provides you (from an administrator in your system, or to a preloaded one from the vendor)
  • Avoid using typical words, characters, or easily accessible personal data in your passwords.
  • Do not reuse passwords – make new passwords for every account online
  • Do not create passwords that are nearly identical to the previous password.

 

  1. Be extra careful in public places

Another mistake that is often made by cyber security experts is to rely on the Wi-Fi network that is available in public places. It is free and is a great option to your work when you’re on the move however it’s not secured. If you are working in a public Wi-Fi connection it’s possible for cybercriminals to steal confidential information through a Man-In the-Middle attack or even gain access to your device. Be safe in public areas:

  • Do not perform sensitive tasks when connected to a network that is public like making payments or sharing files
  • Utilize a VPN when you’re connected to the internet to conceal your position
  1. When you notice an update to the software on your PC, do it!

If you notice an icon appear at the bottom of your screen that contains an update to your software ensure that you download the update as soon as you can. Software updates address security flaws in the software and apps that you install for your device. They usually respond to a threat that is being used to attack. In the absence of updating, your applications that you run vulnerable to attack. Find out what could occur when you don’t upgrade your applications immediately after you see the update notification pop up. Be secure:

  • Always download updates as soon as you notice it
  1. Security features and programs exist to help protect you

Your CISO and the team could have already installed security features on your work and personal phones as well as computers to help protect your organization’s networks.

They could make you feel sluggish or become frustrating, but they’re designed to aid you. For instance, firewalls safeguard your system from malware, viruses or other intruders on your network. Limitations on downloads help prevent someone from accidentally downloading malware while spam filters block harmful emails before they get to your inbox. Be in peace:

  • Do not disable or change the security setting on either your device or computer.

 

  1. Be careful when browsing websites that are not trusted.

Another common security lapse is surfing unsecure websites. Websites that are not trusted could contain malware, and any link that you click may install malware on your device or computer. If your gadget is linked to an network at work, it could expose the entire organization. While the cat-related videos or the funny clip that someone might send you look like innocent fun, but the site the videos are hosted on could be something else.

Be safe while surfing the internet:

  • Do not override the antivirus software that blocks access to the site
  • Be aware of the warning signs for unsafe websites, including unusual URL endings (for instance .biz)
  • Find the look for the in the ‘https’ section at the beginning of the URL. You can also look for the green padlock icon within the bar of URL. Both are indications of secure websites.
  1. Do not plug in unknown USB Flash Drives to your computer.

If you aren’t certain the person a flash drive belonged to and are unable to confirm the storage of the drive securely, don’t make use of it. USB flash drives may be infected with malware that will be downloaded onto your system as soon as you connect it to your computer.

Use USB flash drives safely:

  • If you’re not sure, use an updated USB flash drive
  • Keep all USB devices in a safe space, such as an unlocked drawer
  • You shouldn’t loan your USB drive or borrow it from a friend
  • If you discover an USB flash drive you can give it to the IT department to verify
  1. Secure your personal computer

Many employees access their work email and other applications via their smartphones or personal computers to ensure they are connected even outside the office. If they connect to applications for work beyond the secure network of their workplace and add an additional level of risk for security breaches. If you forget your device in a public area or even being robbed while you’re not looking at it isn’t going to have a pleasant conclusion.

If a device that has been infected connects to the network, it can infect the entire network and cause chaos at work.

Keep your office safe:

  • Make sure you don’t take your laptop or phone away from your view
  • Only connect to secure networks or make use of VPNs or VPN for connecting to a network that is public.
  • Do not take your devices out in a hurry
  • Make use of a fingerprint or password to secure devices
  • If a device that contains sensitive information about work is stolen be sure to report it to IT security team immediately. IT security department immediately
  1. Everybody is at risk an attack on the internet

It’s only an issue of when, not whether anyone is likely to fall victim to some kind of cybercrime. There is no one who is too small or small to be a target. Hackers don’t care about size They just want to make money in some way. It’s it’s best to adhere to secure cyber security guidelines, and to make it more difficult for cyber criminals to gain access to your accounts, devices or personal data.

  1. Cybersecurity is a responsibility for everyone.

Yes, you read it right. Every employee of an organization is responsible for the duty to safeguard the business’s networks, data and systems. Be accountable for keeping your phone, computer, as well as accounts safe. make sure you don’t make a costly security lapse.

 

Be Safe and Secure:

  • Take part in the professional security courses the company offers take the information you’ve learned
  • Be sure to follow the cyber security guidelines that are listed above.

 

 

Leave a comment