Seven useful tips to help us to stay vigilant on security

  • 06 November 2014

1. It is the period of internal defence mechanism from the outside defence system.

a) SSL Certificates - Internal defence

b) Firewalls - Peripheral defence

There has been some massive efforts being used in creating powerful internal defence mechanisms to counteract problems and information thefts. It is eminent to get industry suggested security firewalls too, which will work as most important level of defence against most threats.

2. By using the same security password throughout online systems Laziness is in many cases very harmful, by using the same password for a number of online systems you have, you will make your life easy certainly, however you are helping the attackers at the same time.

What you should't do:

a) Using the same security password for different accounts - in case attacker manages to get one of the web site’s you use, you can at least be be confident that the accounts are secure.

b) Use simple passwords - we usually have a tendency to create passwords with the names of people or home animals who are close to us, or even the cars vehicle identification number. Attacker can very easily figure out that and jump right into the system without any resistance. Therefore, it is much better to have a very strong password which is a combination of numbers, lower and upper case alphabets, special characters, which can be anywhere in between 8-10 characters long.

3. Information loss and post attack breaches

It is very common to search out spammers trying to sell millions of records on the internet right after an attack on some well known web site. Along with a huge play field which has an increasing amount of social websites at the disposal, searching for a bait for this kind of features might be very simple.

Does this mean passwords aren't any longer a strong method to reject scams?

4. Follow the practices of strict data compliance guide

Limiting access to business information basis the staff roles - Business Security professionals have been regularly suggesting companies to lay strict perimeters for accessibility of company's information to staff. Limited access to private information should be carefully complied to prevent thefts.

5. User - The most vulnerable field

An organization may have set up a state of the best security perimeter using excellent equipment and systems, however that mainly will protect you against the outside threats. An organization that is serious about their own security also have to evaluate the internal risks i.e. employees.

6. Keeping Account Details over Mobile Phones

In case you still believe that the phones these days are just devices for making and receiving phone calls, rather than portable computers, there's a chance that you're opening doors to a lot of problems. Many people store a large number of sensitive information on their smartphones. Details ranging from information of savings accounts to social media sites are saved over the mobile phones.

Along with this amount of sensitive information available on a single device, take into consideration a situation of a hack into your device. Which means that, it is extremely important to avoid any type of sensitive information to be saved over the mobile phone or any other device.

7. Respond

It has been noticed quite often by the security agents, a large number of people come into action after they face the attacks, threat or breaches. However, firms must have and implement strict policies for internal audits for weaknesses and vulnerabilities.

Last modified on Thursday, 06 November 2014 18:03