IS USING INTERNET SAFE?

Regardless of its size and sector of activity, your company is likely to keep data sought by computer criminals: banking information, personal information on customers or employees, lists ... software, spamming from your email address, or crashing.
To achieve their ends, computer criminals take advantage of security holes in your networks to cause malicious software, also known as malware, to install itself on your computer without your knowledge.It is difficult to be completely safe from cyber-attacks, but
several actions and best practices can help you reduce the risks. Here are a
few.
Computer
systems configuration
Use separate computers for your business and personal needs.
Equip your computers with a firewall, anti-virus software and
anti-spyware software. Update these software regularly. They can block any
intrusion attempts.
If you are using a wireless network, be sure to secure it.
Change the password provided by your Internet provider and modify the router
address.
Management
of sensitive data
Secure access to sensitive data, such as confidential data.
Perform regular backups of sensitive data in a different
system than the one you currently use.
Permanently delete data you no longer need.
Limit the collection of personal information from your
customers to what is strictly necessary, especially when you carry out a
transaction.
Before you get rid of old computer devices, reset them or delete
all data stored on them.
Use of
email and internet
Avoid emailing confidential information, such as a social
insurance number or password.
Avoid downloading attachments or clicking on hyperlinks in an
email you don't know from.
Delete suspicious emails sent by senders you know.
Clear any browsing traces before closing your browser.
Do not save passwords in your browser.
Password
management
Create passwords that correspond to a high level of security.
They must contain numbers, letters and special characters as well as upper and
lower case letters. They should also be longer than the minimum number of
characters required.
Choose a different password for each use.
If you are using a smartphone, protect it with a password
corresponding to a high level of security.
As much as possible, memorize your passwords. If you
absolutely must write them down somewhere, do so somewhere other than in a
document at your workplace or on your computer, unless you save them with software
intended to encrypt them.
Change your passwords regularly.
Human resources
Limit the number of employees to whom you give access to
sensitive data. In general, give your employees only the access they need to
perform their tasks.
Set up an Internet use policy and educate your staff on risky
practices.
If one of your employees leaves his job, deactivate his
various personal accesses: access to his computer station, to the remote
network, to his mailbox, etc.
Comments
Post a Comment