Page 61 - Cyber Warnings
P. 61







1. Enable the device’s data to be wiped. There is a feature that will ‘wipe clean’ a
device that is password protected. This is a useful feature that can be activated after
many failed login attempts. Each device should erase company or sensitive data.
2. Get creative with passwords. It may be one you’ve heard before but do not reuse
passwords! This is easily forgotten but an important safety measure.
3. Don’t trust an unknown e-mail address. Never trust a sender who poses as an
individual claiming to be a part of the board of directors or the CEO.
4. Be wary of free downloads. Some malware and computer viruses hide behind the
free download scheme, leaking sensitive information within seconds and locking the
device’s screen so only the hacker can access the information.
5. Learn to recognize a phishing scam. While most phishing scams rely on pushing
users to a malicious domain, an incident like the recent Gmail attack instead led
individuals to mistakenly allow broad permissions to a malicious application. As a
result, hackers could get full access to a person’s Google account while also sending
emails that appear to be from the victim.
6. Start deleting. Shed the unwanted risk of computer files you no longer need by
deleting excess clutter – whether on your desktop, laptop, or saved on your mobile
phone.
7. Beware of Public Wi-Fi. If you absolutely must use public Wi-Fi for sensitive
transactions, use a Virtual Private Network (VPN); this encrypts your transmissions;
and at home ensure your Wi-Fi is secure.
8. Do not “root” or jailbreak your device’s system. Never mess with the factory
settings on a personal device. This opens it up to viruses and can destroy the
model's system from functioning properly.
9. Update your apps. Never delay your updates as this could be a prime window for
hackers to sift through vital information because an app’s security is now vulnerable
and out of date.
10. Always buy and install apps from reliable sources. Keep app installs limited to
Google Play or iTunes, depending on the device.


BYOD is here to stay. Get your employees involved – educate, seek their recommendations,
and ensure that the policy and expectations are clear. This way, everyone can safely leverage
all the conveniences and productivity benefits of anywhere, anytime access to information.

About the Author

Steven Bearak is the CEO of IdentityForce, a company commercialized from nearly four
decades of in-depth experience around personal identity and security services and products.
IdentityForce is a leading provider of proactive identity, privacy, and credit protection for
individuals, businesses, and government agencies. In May 2017, IdentityForce introduced a
mobile app to help members stay protected anywhere, anytime. For more information, visit
www.identityforce.com.



61 Cyber Warnings E-Magazine – July 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   56   57   58   59   60   61   62   63   64   65   66