Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Resolve to Follow These 8 Steps for Better Data Security in 2017

    By
    Sean Michael Kerner
    -
    January 17, 2017
    Share
    Facebook
    Twitter
    Linkedin

      PrevNext

      1Resolve to Follow These 8 Steps for Better Data Security in 2017

      1 - Resolve to Follow These 8 Steps for Better Data Security in 2017

      The start of the new year is a great time to revisit best practices and improve the fitness of your online security.

      2Change Your Passwords

      2 - Change Your Passwords

      Some, but not all, sites and services will remind users automatically after a set period of time to change their passwords. It’s important to regularly change passwords on every site you use to help lower risk.

      3Don’t Re-Use Passwords

      3 - Don't Re-Use Passwords

      Sure, it’s easy to use your cat’s name and your birthday as a password that you easily remember. Using that same password across multiple sites, however, is not something you should ever do, as it raises your risk profile. Data breaches happen, but put all your online accounts at risk should one be breached.

      4Use Multifactor Authentication Tools

      4 - Use Multifactor Authentication Tools

      So you’ve followed the first two steps, changing your password and not reusing passwords, but there are still risks. An attacker still potentially can steal a password in a data breach or through a phishing scam. That’s why using some form of multifactor authentication is helpful. Many popular online sites including Google, Facebook, Twitter and LinkedIn have some form of multifactor authentication, providing a second layer of account protection that you should be using.

      5Patch Everything

      5 - Patch Everything

      Even if you’ve followed the first three steps and your password fitness is top-notch, you’re still at risk from potential exploits that could be lurking in unpatched applications with known vulnerabilities. Some applications, such as Google’s Chrome, automatically stay updated, but many others do not. So, be sure to exercise those fingers and check for any updates regularly and often to make sure you’re patching everything (operating system, browsers and all applications).

      6Use a VPN

      6 - Use a VPN

      If you’ve made it this far, congratulations: You have a fit password posture and your operating system and applications are up to date. But there are still other risks. Not all sites or WiFi access points are secure, potentially exposing users to risk by sending information in the open and unencrypted. In 2017, choose to use a Virtual Private Network (VPN) more often than not. With a VPN you’re creating an encrypted tunnel that will limit the risk of snooping.

      7Consider Not Clicking on Unknown Email Links

      7 - Consider Not Clicking on Unknown Email Links

      Phishing attacks often come in via email, tricking users into clicking on seemingly legitimate looking links. Before clicking on links in 2017, right click or copy/paste the link into a separate browser window first to see what the link actually is and where it is going. Better yet, avoid clicking on unknown or suspicious links in email altogether, if you can.

      8Revoke Unused Site and App Permissions

      8 - Revoke Unused Site and App Permissions

      On Facebook, Twitter and other popular online sites, users often will grant access to third-party applications. Sometimes users use Facebook, Twitter or Google (often via the OAuth protocol) to log in to other sites. Some of those logins and third-party apps may hold onto that permission or authorization for longer than the length of a session. To say digitally fit and secure, visit the list of third-party authorized apps in your Facebook, Google and Twitter accounts and remove those that you no longer use or need.

      9Back Up Everything

      9 - Back Up Everything

      Finally even if you’ve followed the previous eight steps, there are still other things that can go wrong. Among the biggest security risks that emerged in 2016 was ransomware. In 2017, resolve to stay digitally fit and secure, and have a continuous backup plan for your account information and all your data.

      PrevNext

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×