Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Improving Cyber-Security Hygiene: Nine Methods to Fight Off Intruders

    By
    Chris Preimesberger
    -
    February 2, 2018
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Improving Cyber-Security Hygiene: Nine Methods to Fight Off Intruders

      Improving Cyber-Security Hygiene: Nine Methods to Fight Off Intruders

      There’s no question that hacked credentials and thefts of business data and personal information are on the rise. The number of breaches caused by compromised usernames and passwords rose 18 percent in 2016, according to Verizon’s 2017 Data Breach Investigation Report. Today, more than four out of five intrusions start from stolen credentials. There are actionable steps that everyone, from the individual to the major corporation, can take to protect themselves. This eWEEK slide show, using authentication security expertise from WWPass founder and CEO Gene Shablygin, offers nine of the most effective ways you can stop the most notorious criminals from stealing identities and wreaking havoc. Some of these we’ve heard previously, but they cannot be highlighted too often.

      2Get a Password Manager

      Get a Password Manager

      A major part of the problem is how we use passwords. If you can create and remember the credentials, a creative hacker with a few tools can obtain the login information with relative ease. Password managers ensure that passwords are long, randomized character strings that aren’t easy to crack. Since the owner only knows one master password to get in, the rest are safe from the worst types of attacks.

      3Use Multifactor Authentication, Especially for Password Manager

      Use Multifactor Authentication, Especially for Password Manager

      Most of the time, a hack is already underway when an organization discovers it. It could be too late to intervene and prevent damage by then. Setting up multifactor authentication (MFA), whether it’s an email confirmation or security token, will create an extra hurdle the hacker needs to get over to pull off the breach.

      4Upgrade Passwords for Tighter Security

      Upgrade Passwords for Tighter Security

      Use a password generator.  At the bare minimum, your passwords should adhere to the following rules: Use no fewer than 10 to 12 characters, a mix of upper and lowercase letters, a combination of letters and numbers, no personal identifying information and no identifiable words in any language. Anything less than this puts you at risk from password cracking, which has gotten much more effective as the technology has progressed.

      5Don’t Reuse Passwords—Usernames, if Possible

      Don't Reuse Passwords—Usernames, if Possible

      Despite your best efforts, sometimes credential theft is beyond your control. Since usernames also function as an “online address,” multiple accounts can be at risk when one is compromised. Every password must be unique in order to stop the domino effect of account hijacking. At the very least, insulate accounts with sensitive data from noncritical ones by creating passwords (and usernames) that are solely used for each individual account.

      6Beware of Public Networks

      Beware of Public Networks

      Public WiFi is tricky: While convenient, you never really know who else is connected, or if the WiFi source itself is a trap. It’s best to avoid connecting your computer to any public network unless you absolutely trust the source. Either way, it’s best to keep your online activities to a minimum, especially if you conduct sensitive activities such as banking or checking your work email on public networks.

      7Update and Patch Software and Operating Systems

      Update and Patch Software and Operating Systems

      No piece of software is perfectly secure on Day 1, and researchers discover exploits for outdated software all the time. Viruses can easily infect these machines, as recently proven by the Petya ransomware attack. Security pack updates are vital if you want to seal these exploits. Always use up-to-date software before you ever connect your device to the internet.

      8Beware of Social Engineering

      Beware of Social Engineering

      Be wary of anyone who asks for your passwords through email, phone or texting. Even the savviest people have fallen for official-looking emails with doctored logos and origins. Almost every company responsible for storing your login credentials doesn’t do this for security reasons. In these circumstances, it’s better to follow the old motto “trust no one.”

      9Keep Track of Installed Software, Administrative Privileges

      Keep Track of Installed Software, Administrative Privileges

      IT departments can have their hands full trying to stay on top of exactly what’s going on with the computers for their team as well as everyone else on the network. However, keeping an eagle eye on software installations, suspicious web history and permission requests will make it much easier to notice anomalies that could be malicious software or an intruder. Be cautious when installing new software or apps; you should ensure new prompts for updates come from trustworthy authors. Only give administrative access to trusted executives to minimize the potential spread of malware.

      10Always Back Up and Encrypt Data

      Always Back Up and Encrypt Data

      Regularly backing up your data is IT 101. It’s no less important today than it was during the PC boom of the ’80s, but this simple step can fall to the wayside as a lower priority among other fire drills IT has to handle. You can easily recover from any breach, including the Petya attack, if you can restore the system to a pre-hacked state. Creating encrypted backups should be a part of your IT team’s routine.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.