Cybersecurity rules checklist

18 June 2021 Open Technologies Cybersecurity center prepared the checklist of the main cybersecurity rules:

-    Use accredited license antivirus and regularly update antivirus bases
-    Use complicated passwords
-    Periodically change passwords
-    Don’t use the same passwords
-    Don’t disclose your passwords
-    Don’t save the passwords from corporate resources in browsers
-    Don’t save confidential information (bank cards data, passwords and etc) in online-accounts and don’t send it to anyone
-    Use up-to-date browsers with good  incorporated cybersecurity technologies
-    Be attentive in public nets
-    Be suspicious to any web-site, check the correction of its path, certificates and security
-    Try not to connect to public Wi-Fi, use only trusted nets
-    Strive not to use borrowed devices an don’t try to buy anything from them
-    Periodically check your transactions
-    Avoid clicking on unknown links and download files which were received in e-mails and messages from unknown senders
-    Ignore suspicious e-mails and messages. Remember, even the answer on this letter means the validation of the address or number, which can be used for attacks
-    Use confirmations on suspicious e-mails and messages in the official communication channels
-    Install and use only license software from trusted sources
-    Regularly and timely update OS, apps and security systems from trusted sources
-    Block unused and expired accounts at the shortest time span
-    Don’t connect to computers or servers unknown and unchecked data storage devices
-    Turn off unused OS functions
-    Regularly clean your systems
-    Don’t leave your unblocked computer or smartphone without attention for a long time
-    Don’t pass your work computers and corporate services access data to the third parties
-    Develop and integrate the restricted list of access to administrative accounts
-    Don’t work with administration rights without necessity
-    Regularly monitor and analyze log-files
-    Periodically backup data
-    Recommendation: store your back up data in several copies in different places and on different data storage devices
-    Try not to work with freelance and untrusted organizations
-    Check friends in social media before adding
-    Complete a cybersecrity course
-    Promptly inform your Cybersecurity and IT departments, if you notice something suspicious

Open Technologies’ specialists insist on following these rules. Completely exclude all the risks is impossible. Following all the mentioned rules will defend you and your organization from hacks and data theft.

Author: Ivankov Alexei, System architect of Open Technologies’ Cybersecurity center

Prev news:
Hacker attacks: basic types and reasons
Next news:
Is it possible to prevent target attacks?