Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Resolve to Follow These 8 Steps for Better Data Security in 2017

    By
    Sean Michael Kerner
    -
    January 17, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Resolve to Follow These 8 Steps for Better Data Security in 2017

      1 - Resolve to Follow These 8 Steps for Better Data Security in 2017

      The start of the new year is a great time to revisit best practices and improve the fitness of your online security.

      2Change Your Passwords

      2 - Change Your Passwords

      Some, but not all, sites and services will remind users automatically after a set period of time to change their passwords. It’s important to regularly change passwords on every site you use to help lower risk.

      3Don’t Re-Use Passwords

      3 - Don't Re-Use Passwords

      Sure, it’s easy to use your cat’s name and your birthday as a password that you easily remember. Using that same password across multiple sites, however, is not something you should ever do, as it raises your risk profile. Data breaches happen, but put all your online accounts at risk should one be breached.

      4Use Multifactor Authentication Tools

      4 - Use Multifactor Authentication Tools

      So you’ve followed the first two steps, changing your password and not reusing passwords, but there are still risks. An attacker still potentially can steal a password in a data breach or through a phishing scam. That’s why using some form of multifactor authentication is helpful. Many popular online sites including Google, Facebook, Twitter and LinkedIn have some form of multifactor authentication, providing a second layer of account protection that you should be using.

      5Patch Everything

      5 - Patch Everything

      Even if you’ve followed the first three steps and your password fitness is top-notch, you’re still at risk from potential exploits that could be lurking in unpatched applications with known vulnerabilities. Some applications, such as Google’s Chrome, automatically stay updated, but many others do not. So, be sure to exercise those fingers and check for any updates regularly and often to make sure you’re patching everything (operating system, browsers and all applications).

      6Use a VPN

      6 - Use a VPN

      If you’ve made it this far, congratulations: You have a fit password posture and your operating system and applications are up to date. But there are still other risks. Not all sites or WiFi access points are secure, potentially exposing users to risk by sending information in the open and unencrypted. In 2017, choose to use a Virtual Private Network (VPN) more often than not. With a VPN you’re creating an encrypted tunnel that will limit the risk of snooping.

      7Consider Not Clicking on Unknown Email Links

      7 - Consider Not Clicking on Unknown Email Links

      Phishing attacks often come in via email, tricking users into clicking on seemingly legitimate looking links. Before clicking on links in 2017, right click or copy/paste the link into a separate browser window first to see what the link actually is and where it is going. Better yet, avoid clicking on unknown or suspicious links in email altogether, if you can.

      8Revoke Unused Site and App Permissions

      8 - Revoke Unused Site and App Permissions

      On Facebook, Twitter and other popular online sites, users often will grant access to third-party applications. Sometimes users use Facebook, Twitter or Google (often via the OAuth protocol) to log in to other sites. Some of those logins and third-party apps may hold onto that permission or authorization for longer than the length of a session. To say digitally fit and secure, visit the list of third-party authorized apps in your Facebook, Google and Twitter accounts and remove those that you no longer use or need.

      9Back Up Everything

      9 - Back Up Everything

      Finally even if you’ve followed the previous eight steps, there are still other things that can go wrong. Among the biggest security risks that emerged in 2016 was ransomware. In 2017, resolve to stay digitally fit and secure, and have a continuous backup plan for your account information and all your data.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×