“One person’s “paranoia” is another person’s engineering redundancy”. – Marcus J. Ranum
Recap of Week 14-
Day 66: Read your e-mails carefully, from e-mail addresses to content in the e-mail. Some platforms also give you access to what browsers and devices have accessed it. You can also activate two-factor authentication which is highly recommended by security experts.
Day 67: Back them up on an encrypted external drive or even a google drive should be fine. Make sure your files are password protected all the time. It might be an additional step but it is so worth it.
Day 68: Make sure you use a different password for all your e-mail accounts. By hacking one account, this gives clues to the hacker to hack another account of yours. Use a different password and avoid yourself from being compromised in any way.
Day 69: Best Practice: If you don’t want to risk it, avoid it! Third party stores may have what you want but are they secure? Having a security software that can offer malware protection will help secure your device.
If you would like to speak to our security consultants on best practices to keep your business secure, please contact us to discuss your unique requirements.