Sunday 2 December 2018

10 Cybersecurity Protocols Every Tech Professional Should Follow

Cybersecurity Protocols

Cybersecurity Protocols

Cybersecurity Protocols- It happens to all too many tech professionals at some point. Someone clicks, views or opens something that causes a virus to take over their computer. Or a team member chooses a poor password that makes it easy for their email to be hacked into.

Such situations can be avoided, however, if you make it a priority to educate associates at your company about good practices for keeping digital properties safe. Ten members of Forbes Technology Council share some of the easiest protocols team members can follow to help keep their company protected from cybersecurity breaches.

1. Employing Password Management And Two-Factor Authentication

First, you should use a password manager, like 1Password, that will let you set strong and unique passwords across different personal and corporate accounts, from both mobile and desktops/laptops. Second, you should turn on multi-factor or two-factor authentication for all your accounts that support it, starting with your mail. – Gaurav BangaBalbix

2. Encouraging Email Vigilance

Password policies, multi-factor authentication, encryption, patching and restricting public Wi-Fi usage are all valid measures that should be implemented. However, the weakest links are always behavioral. Keep email users trained to look for suspicious requests, attachments, links and forged sender identities. Remember that tricking people does not require highly technical hacking skills. – Steve PaoHillwork, LLC

3. Raising Awareness Of Phishing

Every employee needs to be aware of what they’re clicking. All should know how to check the sender of an email and to look at any URL or attachment before clicking, and they should notify IT/Security when they find something suspicious. People love to click, but they need to look before they leap. – Alan RossCybraics

4. Utilizing Password Generation Services

Plenty of websites offer strong password generation for free, which might be tedious to remember or store, but is necessary. The company’s name as password entry to a computer is not enough when your clients put their trust in you. Most documents can be password protected as well, adding an extra step for would-be hackers to cause a security breach. – Arnie GordonArlyn Scales

5. Making Better Decisions

We’re focused more on human nature than software patches. The biggest cybersecurity holes are created by employees and human beings rather than systems and encryption. We educate employees on social engineering and tactics used to exploit their human nature. By focusing attention on decision making, we find people are less likely to rely on computers to protect them from foolish human errors. They think. – Tom RobertoCore Technology Solutions

6. Avoiding Personal Devices For Work

It’s good to avoid work access through devices for personal use. For greater password control and access, there should be a set of devices that are only used for work. – Jon BradshawCalendar, Inc.

7. Using A VPN

Whenever our employees access our systems from outside our facility, they must do so through a virtual private network, or VPN. A VPN encrypts everything that passes through, improving cybersecurity. This administrative protocol is in place for our staff, and this policy ensures that all employees access via an encrypted channel. – Marty Puranik,Atlantic.Net, Inc.

Read More Here

Article Credit: Forbes

Go to Source

The post 10 Cybersecurity Protocols Every Tech Professional Should Follow appeared first on Statii News.



source http://news.statii.co.uk/10-cybersecurity-protocols-every-tech-professional-should-follow/

1 comment: