
As we approach the holidays, now is a great time to reflect on the previous year. Everyone knows Santa is always watching to decide who is naughty and nice, but we want to know how you have been personally with your privacy and security this year. We’ve put together a list of cybersecurity best practices to help you decide on which list you fall. If you personally do at least 7 of these 10 things on a regular basis, you are on Trend Micro’s nice list.
If not, you’re on the naughty list and may get coal in your stocking this year…not to mention risk being the victim of an online threat.
Here’s the list, check it twice to find out if you’re naughty or nice!
| - Use different passwords across online accounts – If not, you might invest in a password manager that makes this easy
- Don’t download apps without reading the privacy agreement – Did you know many popular apps own your data to do with it what they want?
- Regularly monitor charges to credit cards and bank accounts for suspicious activity – Cyberthieves will regularly test your account by doing very small transactions that might go unnoticed.
- Utilize a full featured security solution – Today’s threats are more sophisticated and require newer, advanced threat technologies offered in some security solutions
- Confirm emails are legitimate before opening an attachment or clicking a link(even if you have to call the sender to confirm) – Phishing emails are difficult to identify, but in many instances they will use recent news or use language/content that is intended to make you act quickly (package notices, account updates)
- Don’t click on links in email: enter them yourself into your browser – Hackers often obfuscate the real URL they want you to visit as they know most users won’t check them
- Are careful not to provide too much information about you or your family when registering online – Provide the data with the knowledge that it will be stolen at some point.
- Download mobile apps only from an approved app store – Use Google Play or Apple Store and check the ratings and don’t download apps directly from email requests
- Regularly apply security updates to your devices – Unpatched vulnerabilities are regularly used by cybercriminals to infect victims
- Be skeptical of any requests for your information via email, social media, websites and phone – If it is too good to be true, it likely is
|
| |
So…have you been naughty or nice this year?
Please let us know in the comments below or tweet me on Twitter; @jonlclay.
from Trend Micro Simply Security http://ift.tt/1MrgbuJ
via
IFTTT