How can you tell if the email you’re about to click on is safe or not? It seems every time you learn to recognize a trick a hacker is using to try and breach your data, there is a new cyber threat we need to watch. It can be overwhelming to understand what to click on and how to configure the best cyber solution for your business.
Cybercriminals have access to the same news, topics, and information that everyone else does. The good guys gather research, learn ways of protecting themselves and others, and stay on top of the situation to protect data and you’d better believe that cyber thugs are doing the exact same research. Only they want to break into the data you are protecting!
Use automatic updates to stay up to date and as you receive them, be sure to install security patches. Using an antivirus, antispam, antispyware software, and activating your firewall are great first lines of defence but should be used in conjunction with a layered approach and not on their own.
Ask yourself the following questions when it comes to sharing information in response to an email or text message.
- Is there an ‘s’ on the web address (https)?
- Is there a closed lock icon in the address bar?
- Is the company asking for this information a legitimate company?
- Why do they need this information?
Really look before you click on email attachments. Please take a second look to ensure they make sense. Make sure the email address the message is coming is legitimate. By hovering over any links, it will allow you to see if it looks like a real site. The address the email is coming from should be one you recognize. Look closely at the address for clues it may not be accurate such as any spelling errors or an incorrect company name.
Lock all your online accounts, your computer or laptop, phone, and any other devices with a password. Using at least eight characters or longer is the right choice. Include a random mixture of upper- and lower-case letters. Use numbers or symbols as well. Do not disclose your password to coworkers or businesses such as internet café operators. Do not use the same password across all devices. Click here for some great ideas on not only coming up with great passwords but remembering them too!
Social distancing has made remote working the norm. Still, with coffee shops, libraries, and other places offering public WiFi, you will want to ensure you are safeguarding the data on your device. Use public WiFi only if it’s password protected and encrypted. Make sure you confirm you are clicking on the right spelling of the wireless network you are trying to connect on. Beware of cleverly disguised, often slightly misspelled fakes.
You will want to encrypt the data on your laptop or other mobile devices just if it is stolen. Do not leave your device in the care of someone you don’t know while you run to use the washroom or order another cup of coffee. If you would not ask someone to hold onto your wallet, that’s a pretty indication they shouldn’t be watching your device.
Practicing these email cybersecurity tips each time you have the opportunity will ensure they become healthy habits. Using each of these methods will reduce the effects of a threat. A layered security approach offers different security controls at various levels to protect your devices and, ultimately, your data. Having a layered approach in protecting your data makes it difficult as possible for cyber thieves to get what they are after.