Do’s and Don'ts of Cybersecurity!

 
concepto-seguridad-bloques-madera-icono-candado-papel-plano-mesa-azul-mano-hombre-apuntando_176474-10447.jpg

Avoid being hacked and maintain cyber security when browsing the internet.

The significant increase in the consumption of technology, as a result of social isolation and remote work policies applied by many companies,  has made a considerable elevation in the number of digital attacks carried out by cybercriminals in order to obtain, modify and eliminate sensitive user data.

For this reason, soluntech outlines some tips to avoid being hacked and maintain cyber security when browsing the internet.

PASSWORDS 1234.jpg

Passwords

Combine a fixed and a variable part.

Use different passwords. It can be difficult to remember dozens of passwords, but you can always use one that combines a fixed and a variable part.

Do not use excessively simple passwords such as "1234" or those that have a clear relationship with you as the name of your pet. A good combination of uppercase and lowercase letters and numbers can be the difference between hacking your account in a few hours or taking months to do so.

Remember that you must always change passwords every two to three months.

multifactor authentication.jpg

Authentication

Opt for a multifactor authentication.

Surely it has ever happened to you when you log in to some unusual computer or device, you have to enter a password that is sent to you by email. No one will be able to log in to your account if they cannot get the identification code that is sent to you. Opting for this authentication (Multi Factor authentication) is one of the insurance that many companies offer, but that users do not usually use.

wifi network.jpg

Wi-Fi Networks

Most public free hotspots are unsafe.

Avoid unknown open Wi-Fi networks! Most public free hotspots are unsafe. If you have no other option, try not to access any service that requires a username and password such as your email or your social networks.

email.jpg

Emails

First, assess the content of the message.

Regarding emails you must avoid giving your data as a general rule, the first step to identify a phishing attack is to assess the content of the message.

The impersonation attempt can come from a bank, a social network or a public entity and the purpose of these emails is to scare the user and make him act quickly with the actions they indicate. For this reason, they offer you a simple solution by providing a link, and in which once you access they ask you for your username, passwords or access data to your account. Be totally suspicious of these emails and never provide your data by email.

Normally in this type of mail the spelling rules do not apply and you can find various errors such as poorly structured phrases or words with strange symbols.

Keep in mind that a serious entity, such as your bank or the public administration, would never make grammatical mistakes.

security-protection-anti-virus-software-60504.jpeg

Check for reliable links

The intention of these identity thieves is that you click on the link to take you to a fraudulent website. The link they provide does not take you to the official website, but to another that is aesthetically the same or very similar. So, if you doubt the veracity of the email, never click on the link provided.

How can you know which website the link points to? Very easy!

By putting the mouse pointer over the link and observing the true address shown on the left at the bottom of the screen.

Also, check that the web page you have accessed is a secure address and begins with https: // and a small closed padlock in the browser's status bar. Check the sender of the mail.


Although it seems absurd and unimportant, we have to verify the sender's address. The fact that the email comes from an apparently correct email does not mean that it is. The sender can be manipulated and cybercriminals can send emails by modifying the name of the entities.

We hope that you can take these tips into practice and that you are attentive to possible attacks in your workplace or at home.