There are a lot of processes one can put in place to prevent against cyber attacks. Many of these were highlighted in last week’s article: 10 Steps to Go from Cyber Novice to Cyber Expert. It takes time to grow an agency/brokerage with a secure foundation. However, there are things you can do right now to protect yourself and your digital assets from a myriad of viruses and hacks. The list below features tips from the 2017 Connections print edition, plus three additional ideas. Everyone in your agency or brokerage can apply these best practices to make their computers safer against cyber threats:
|
Keep your operating system current: Computer operating systems regularly update to stay current on technology requirements and patch security gaps. While it may be annoying to install the updates every now and then, doing so safeguards your computer. |
|
Be smart about downloads:
Never download an email attachment unless you know the sender—this is among the most common ways computers become infected with a virus. Also be wary of emails that are addressed ‘sir/madame.’
|
|
Shut down your computer:
Many people get up and go at the end of their work day, often neglecting to shut down their computers. But when your computer is on, it is vulnerable to an attack. Shutting down your machine eliminates an attacker’s connection to the computer, so make it a habit to shut it down at the end of every work day.
|
|
Download firewall protection on your computer:
This is a network device that blocks specific types of traffic, like untrusted networks. Not all firewall software is created equal. For an effective firewall system, look for one with a management interface that showcases traffic flow. You should have the ability to make decisions about which types of traffic to block or allow. Instead of simply filtering websites and digital entities, a managed firewall should give you more insight into the process.
|
|
Use a password management tool:
Computer users often fall into these two password traps: Using the same generic password for everything, or having so many passwords that they have to constantly reset their login credentials. Password management tools minimize both problems. It is essentially a vault that holds your usernames, passwords and additional login info in a secure location. Many of them even sync to your other devices to allow for ease of access. With password management tools, you can have a different password for everything, further minimizing the risk of a cyber attack.
|
|
Set up multi-factor authentication:
This process allows for the verification of a user’s identity through a combination of two or more different components. Verification is usually composed of two of the three following categories:
- Knowledge - something the user knows, e.g., answers to pre-set security questions
- Possession - something the user has, e.g., a cellphone
- Inherence - something the user is, e.g., fingerprints
This method is becoming increasingly popular. Companies like Google have two-step authentication security options in place both for personal users and businesses.
|
For more cybersecurity tips and tricks, read our other October 2017 Connections blog posts and the 2017 print issue of Connections.