7 Lesser-Known Security Tips for Your New Device
December 13, 2018 By Christopher George antivirus software, automatic updates, computer security, device features
Hoping to find a new laptop, tablet, smartphone or other device under the tree? Every time you use technology, whether at work or at home, you are sharing personal identifiable information (PII). With any new device, you must take precautions to ensure safe processing and storage of this data. Without a proactive-security approach to defend against hackers and identity thieves, you are setting yourself up for an unhappy 2019.
Antivirus software, using strong passwords and changing them frequently are great first steps, but they are not enough to protect you. Our engineers have put together these 7 tips to help safeguard you on all sides.
- Secure your router
While ISPs, cable modems and digital subscriber lines (DSL) generally provide security monitoring to some degree, it’s important to set up your router’s firewall as another critical layer of protection. Refer to your user’s guide for step-by-step instructions and make sure to choose a strong password to help prevent uninvited changes.
- Enable and configure your operating system firewall
Most of today’s computers have an integrated firewall already built in to the operating system. Ensuring the firewall is turned on and settings are customized to suit your usage helps prevent malicious software from gaining access to your devices through a network or the internet.
- Enable automatic updates
From software to operating systems, enabling automatic updates whenever possible is the easiest way to patch vulnerabilities. This will further safeguard your devices against hackers on the prowl.
- Remove or turn off unnecessary software and device features
Turning off or customizing features of your device set by the manufacturer, as well as removing unnecessary applications reduces the points of entry an intruder can exploit. Take some time to review the applications and features on your device. If you don’t know what a particular program or feature does, research it to confirm whether or not it is required for operation before turning it off or uninstalling.
- Secure your web browser
Most antivirus software offers additional plug-ins to safeguard you. Enabling the security features in all your web browsers adds another layer of protection.
- Be cautious with email attachments and embedded links
Phishing and whaling can get you into trouble if you don’t know what to look for. Do not click on links or open email attachments that contain poor grammar, punctuation or misspellings. Watch out for suspicious emails from banks, online retailers or anyone requesting passwords or other sensitive information. Inspect suspicious URLs by hovering over links and attachments before clicking on them, and make sure to verify and review sender domains. It’s always better to call the source of the email on the phone directly to confirm the validity of the request. Educate yourself and see real-world examples in our ransomware guide.
- Always check with IT before using a personal device for work
Connecting personal devices to a work environment increases your employer’s vulnerability to data breaches. Many companies have strict policies about using personal devices for work activities, so it is absolutely critical to check with your internal IT department before connecting.
As technologies advance and become a greater part of our lives both at home and at work, so should cybersecurity. Our Premonition™ Security Suite is a managed-security solution that delivers multi-layered protection for small and medium-sized business, including organizational awareness courses that help you stay ahead of the changing cyber-threat landscape. Call us at (855) PRO-TELL and ensure your organization has a happy 2019 and many more to come.
Recent Posts
Archives
- August 2020 (1)
- July 2020 (1)
- June 2020 (1)
- May 2020 (1)
- April 2020 (1)
- March 2020 (1)
- February 2020 (1)
- January 2020 (1)
- December 2019 (1)
- November 2019 (1)
- October 2019 (1)
- September 2019 (2)
- July 2019 (1)
- June 2019 (3)
- April 2019 (1)
- March 2019 (1)
- February 2019 (1)
- January 2019 (1)
- December 2018 (1)
- November 2018 (1)
- October 2018 (1)
- September 2018 (1)
- August 2018 (1)
- May 2018 (1)
- March 2018 (1)
- February 2018 (1)
- January 2018 (2)
- December 2017 (2)
- November 2017 (3)
- October 2017 (3)
- September 2017 (2)
- August 2017 (3)
- July 2017 (2)
- June 2017 (5)
- May 2017 (7)
- April 2017 (5)
- March 2017 (5)
- February 2017 (1)
- January 2017 (5)
- December 2016 (1)
- October 2016 (4)
- September 2016 (1)
- August 2016 (3)
- July 2016 (1)
- June 2016 (1)
- May 2016 (1)
- April 2016 (1)
- November 2014 (1)
- July 2014 (2)
- June 2014 (1)
- May 2014 (3)
- April 2014 (3)
- March 2014 (1)
- February 2014 (2)
- January 2014 (3)
- December 2013 (1)
- November 2013 (4)
Categories
- Community (19)
- Cloud (18)
- IT (16)
- cloud backup (16)
- cybersecurity (15)
- cloud backup data recovery (9)
- cloud computing (8)
- clouddr (8)
- it security (8)
- cloud storage (7)
- data security (7)
- AWS (6)
- Education (6)
- cloud services (6)
- Giving Back (3)
- cloud restoration (3)
- compliance (3)
- data (3)
- assessment (2)
- business (2)
- chief information officer (2)
- client satisfaction (2)
- cloud data recover (2)
- cloud dr (2)
- critical power exchange (2)
- cyber (2)
- cyber responsibility (2)
- data recover (2)
- datacenter (2)
- duo security (2)
- end-to-end encryption (2)
- hackers (2)
- holiday season (2)
- internet (2)
- storage (2)
- 2019 goals (1)
- Android (1)
- Arts (1)
- Business Continuity (1)
- CASBO (1)
- Cisco Cloud Web Security (1)
- Cisco Security Intelligence Operations (1)
- Custom Design (1)
- Graphics (1)
- Protelligent (1)
- Virus (1)
- account protection (1)
- advanced persistent threats (1)
- alien vault technology (1)
- alienvault technology (1)
- antivirus program (1)
- antivirus software (1)
- apis (1)
- apt (1)
- attachment (1)
- attack (1)
- automatic updates (1)
- awareness (1)
- backup (1)
- benefits (1)
- best practices (1)
- bot-driven attacks (1)
- bring your own device (1)
- bug (1)
- business growth (1)
- byod (1)
- california joint powers insurance authority (1)
- california jpia (1)
- check cashing (1)
- cisco (1)
- cjpia (1)
- client testimonial (1)
- cloud backup vs cloud storage (1)
- cloud computing services (1)
- cloud conversion (1)
- cloud migration (1)
- cloud recovery (1)
- community link consulting (1)
- compliance program (1)
- compliance regulations (1)
- computer science (1)
- computer security (1)
- computers (1)
- contain attacks (1)
- cost of cybercrime (1)
- cost of data breach study (1)
- critical power (1)
- critical power products & services (1)
- customer testimonial (1)
- customer testimonial video (1)
- cyber liability (1)
- cyber-threat (1)
- cybercrimes (1)
- cybercriminals (1)
- cybersecurity program (1)
- data access (1)
- data breach (1)
- data breach protection (1)
- data center (1)
- data encryption (1)