9 Important Cyber Security Guidelines

Information security East Africa

Regardless of how expensive the security tools guarding your network are, there is no way to forecast the damage you can face due to a single careless act or malware threat. The conflict against cyber scammers is fought whenever a user determines to click a new link or open up an attachment, and simply a single mistake may be the reason for large data loss.

Invest in the information security in East Africa from good IT consulting companies significantly even if you're already using Umbrella by OpenDNS to safeguard your network from malware and other risks. There surely is no replacement for educating your users. Show this list to your employees, to save your business from huge data loss and dysfunction.

1. Recognize that you are an attractive goal for hackers. Practice good security password management. Use a solid mix of characters, and do not use the same security password for multiple sites. Don't reveal your security password to others, do not write it on the post-it note mounted on your monitor or any other places accessible easily.

2. Never leave your computer systems unattended. If you want to leave your personal computer, cellphone, or tablet for just about any amount of time, lock it up so no-one can put it to use.

Cyber-Teq

3. Be careful when simply clicking links or attachments in email. Whether it's unexpected or dubious for just about any reason, don't select it. Check the Web address of the website the link goes to.

4. Sensitive surfing is necessary, especially on the online sites of bank or e-commerce shopping, should only be achieved over a device that you own, and on the network or service provider that you trust. Be it a public computer, a friend’s mobile, or a cafe's free WiFi, your data could be copied or taken.

5. Back up your computer data regularly, and make sure that reliable software is updated and running.

6. Be conscientious of what you connect to your personal computer. Malware can be distributed through infected display drives, external hard disks, and even smartphones.

7. Monitor what you're posting on internet sites. Scammers can befriend you and easily access a stunning amount of information, where you go to the institution, where you work, if you are on vacation, that may help them access valuable information and precious data that could be used against you.

8. Be skeptical of the social executive, where someone tries to get information through manipulation. If you get a phone call or email message asking for personal and sensitive information, it's ok to state no. You can always call the business directly to confirm credentials before offering any information.

9. Make sure to monitor your makes up about any dubious activity. In the event that you see something new, maybe it's a sign you've been compromised.