Top 6 Cyber Security Tips
Top 6 Cyber Security Tips

Top 6 Cyber Security Tips

[vc_row][vc_column][vc_column_text]Cyber Security breach incidents, especially to the high profile ones, still occur from time to time. Off the top of my head, I can think of the hacker organisation that targeted CNET, but there are also those small sites you’ve never heard of that are most frequent victims of these kinds of people. These groups make claims of obtaining millions of passwords, email address and usernames.

If you run your own business and have customer data that you would like to protect, or if you love to shop online, visiting the many e-commerce sites out there, and you would like to keep your data safe and secure, then hackers are definitely something you should concern yourself with. Fortunately, there are many steps that you can take to minimise the risk of falling victim to these attackers.

In this article, I’ve listed 6 of the most common ways of doing that.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]

1. Use Complex Passwords 

Your passwords are the first line of defence against these hackers. So you’ll want to use a password that’s complex, utilising both lower and upper case letters, couple with special characters and numbers. The more complex you make it; the harder it is for the hacker to crack.

Generate Complex passwords – passwordsgenerator

If you want to know more about the real life risks of reusing the same passwords check out this article by pixelprivacy

Complex passwords are hard to memorise that’s why you should use password managers like LastPass to get easy access  without memorising the passwords[/vc_column_text][vc_single_image source=”external_link” external_img_size=”full” alignment=”center” custom_src=””][vc_column_text]

2. Use a 64-bit Operating System

Most businesses tend to adhere to the philosophy that, if it’s not broken, you needn’t fix it, they use this mindset to justify still using old operating systems like Windows XP. But when you look at it from the perspective of security, XP is no longer secure; this is because updates have ceased, at least from Microsoft, for all their older operating system, which is especially important for those who want a secure system.

Windows XP has been around for more than a decade, so an upgrade to Windows 7 would be long overdue. When opting to upgrade to Windows 7/8/8.1 or 10, make sure you go for the 64-bit version, as 64-bit operating systems are harder for hackers to crack.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]

3. Keep Your Software Up-To-Date

Make sure all your third-party applications are up-to-date, this means you may need to carry out manual checks from time to time. These updates tend to contain added features which you may or may not care about, but the real reason why you want to apply these updates is that of the critical security patches that they contain.

To check outdated software you can use PC App Store

There are many other tools that you can use to scan all the programs on your operating system so that you can find out which ones require an update.[/vc_column_text][vc_single_image source=”external_link” external_img_size=”full” alignment=”center” custom_src=”×0/filters:no_upscale()/baidu-pc-app-store-57c76a6d5f9b5829f4bb6c60.png” caption=”″][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]

4. Get Rid Of Office 2003

Microsoft Office is a very popular office suite, used by a great many people and businesses alike. However, if you’re still using Office 2003, then you may want to re-evaluate that, why, because Office 2003 documents use the binary file format, which means they can execute potentially malicious code, every time they are opened.

The later versions of Microsoft Office (2007/2010) use the XML file format, which effectively reduces this risk. Office 2010 also supports Protected View, which you can use to open risky files, such as attachments (in emails) and files downloaded off the internet, in a read-only mode.[/vc_column_text][vc_raw_html]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[/vc_raw_html][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]

5. Use Full Disk Encryption on Laptops

Laptops are regularly stolen and lost, and when this happens, your standard password protection simply isn’t enough to keep thieves from gaining access to all the data on your computer. However, with Full Disk Encryption (FDE), you are given an additional layer of protection for securing all your most important files and folders or for the entire contents of your computer, if you like.

Windows 7 comes with FDE built in, as part of a BitLocker feature, though, only Enterprise and Ultimate editions come with this feature. If you’re using any version other than these two of Windows 7, it is possible to upgrade it.

Otherwise, there are many third-party full file encryption tools that you can purchase, just do a few searches on Google, and you should be able to find what you’re looking for in no time.[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]

6. Set Emails to Plain Text

One very creative way that hackers like to infiltrate the systems of their victims is by monitoring when emails are opened and embedding the images in them with malicious code. If you set all emails to plain text, then you get to decide which images and files to trust, and which to not.

Author Info

Uchenna Ani-Okoye is a former IT Manager who now runs his own computer support website @[/vc_column_text][/vc_column][/vc_row]

No Comments

Leave a Reply

Recent Comments
Recent Comments
Close Bitnami banner