No matter how effective or expensive the security tools that protect your network are, there is no way to predict the damage caused by a single careless user. The war against cyber criminals begins by defining computer security measures.
This battle, which is fought every time a user decides to click on an unknown link or open an attachment, can be won if errors are avoided. Keep in mind that even the smallest failure could be the cause of massive data loss.
Effective and easy to implement computer security measures
No less than ten computer security measures make up this list of aspects that users should pay attention to every time they use the Internet:
- Remember that there are no exceptions and that everyone is a target for hackers. There is a lot at stake, for personal and financial well-being and for the company’s reputation. Keeping the organization’s computer resources safe is everyone’s responsibility.
- Keep the software updated. Automatic updates for the operating system and applications must be activated. Using web browsers such as Chrome or Firefox that receive frequent and automatic security updates improves protection. You also have to make sure you keep the browser add-ons updated (Flash, Java, etc.).
- Avoid phishing scams. The first step is to be careful with suspicious emails and phone calls. You have to distrust any email or phone call requesting personal or financial information.
- Practice good password management. A password management program can help to keep passwords secure for all active accounts. These applications can generate secure keys, enter credentials automatically, and remind the user to update their passwords.
- Be careful when accessing links. Avoiding visiting unknown websites and not downloading software from unreliable sources are some of those computer security measures that never fail. These sites often harbor malware that automatically, and often silently, will compromise your computer.
- Do not leave devices unattended. The physical security of the devices is as important as their technical security. If you need to leave your laptop, phone, or tablet for a period of time, it is better to close it so that no one else can use it. If confidential information is stored on a flash drive or external hard drive, be sure to keep them locked as well.
- Protect confidential data. It is important to take into account the confidential data with which you come in contact and the associated restrictions. Another of the computer security measures that must be observed in this regard is to safely delete the confidential data files from the system when they are no longer necessary. Finally, it is convenient to encrypt information when storing or transmitting confidential data.
- Use mobile devices safely. The first step is to block them with a PIN, password, or access by fingerprint or retina recognition. In addition, it should be remembered not to install applications that do not come from reliable sources, keep the device’s operating system up to date, use it neither to store nor to transmit sensitive information, nor to click on links or attachments of emails or unsolicited messages.
- Install antivirus protection. Once an antivirus program is installed from a known and reliable source, the engines and software must be updated to ensure its effectiveness.
- Back up data regularly. In this way, if you become a victim of a security incident, you will be able to react in the only way possible: deleting and reinstalling the system.
In addition to these computer security measures, logic and common sense can help users to protect themselves from the threat, being aware of what they connect to their computers, being careful what they share on social networks and monitoring any suspicious activity.