Here are a few simple points to help you use IST more safely. You may have already heard about all these points, but it is important to remind them.
Security updates and patches
Install security patches for operating systems and your programs. Security threats evolve and try to find and exploit vulnerabilities in your systems. Responsible authors of the systems attempt to fix and eliminate such errors continually, so they release fix packs, patches, and setups of their products. Install them to reduce possible risks.
Use e-mail and the Internet securely
Be careful when you open attachments, links, and when you fill in forms, especially in
e-mails from people you don’t know, but pay attention to the content even from known or seemingly familiar persons. Watch where links go. Beware of phishing. Avoid untrusted download content that is often offered for free.
Use strong passwords
Use strong passwords from a combination of capital and small letters and special characters. Use different passwords for different accounts. Do not email or disclose passwords to anyone.
Use secure software
Operating systems often include antivirus and other security software, or there are also programs from reputable providers available. Configure and use it. It will help you to check downloaded files and email attachments, etc. It is a way to increase your security.
Back up regularly
A computer, telephone, or other device is only a limited lifetime product and can fail, be damaged or lost. They may also be attacked by some malicious software, regardless of your cautious approach. Therefore, back up regularly to some independent secure media or spots. Most operating systems and programs have backup tools that need to be configured. Do it and check the backups, it saves your data.
Access to your device
Do not leave your device freely accessible in common places, especially when you are logged in. Physical security is as important as technical security.
Use a secure connection
If you are connected to the Internet, your data is vulnerable during their transmission. Use encrypted connections when connecting to public networks and be cautious about what you use and where you sign in.
Protect sensitive data
In case you transfer data on portable media, encrypt sensitive data. Be careful also when you dispose of or sell an old equipment. Make sure your data is safely removed from the device.
Use firewall and security software
End devices usually have a firewall and other security software. Set it up and keep it turned on so it can solve many potential problems for you.
Keep track of current development and events. If we have information about current risks and threats, we will let you know.