20 key cybersecurity issues you should consider

xeinadin

Date:

Category:

Share this article:

The following is our checklist of 20 key cybersecurity issues you should consider to help limit the risk and impact of a data breach.

1. Never…

Process a payment or amend existing bank details/ frequent payees based on an email request, always follow up an email with a telephone call before making any payments or changing any details.

2. Hover…

Over the email address or check the nickname to ensure that the sender is who they claim to be.

3. Never…

Click on any unsolicited email links that contain attachments such as .zip or .exe files.

4. Remember…

Banks and HMRC will never use an email or text message to ask for personal information.

5. Never…

Click on a link in a text message irrespective of who this has been sent from.

6. Keep…

Your software, your operating system and your browser fully up to date on all devices especially Smart Phones. Companies continuously add security updates with every software upgrade they release (also called a patch). Installing these patches immediately will help keep you from becoming infected with new strains of malicious software (“malware”).

7. Always…

Use Multi-Factor Authentication (MFA) to log in to any website or application that you use for banking or investment activity, or that has access to your personal data. MFA is essentially another way—beyond your username and password—to help verify your identity and further safeguard your information.

8. Run…

A reputable, anti-virus product on your home PC or laptop and keep this up to date. This will also help prevent your device from becoming infected with malware.

9. When…

Processing transactions and/or sending correspondence, avoid using public Wi-Fi hotspots – like the ones at coffee shops, airports, hotels, etc. If you do use a public Wi-Fi hotspot, be sure to use a Virtual Private Network (VPN) so that others can’t intercept your communications. As an alternative, stick to the mobile network and create a personal Wi-Fi hotspot with your phone

10. Never…

Click on links or open attachments in unsolicited emails or text messages. Doing so may install malware on your device.

<!– wp:acf/did-you-know { "id": "block_60915dcb9601d", "name": "acf/did-you-know", "data": { "did_you_know_title": "Contact", "_did_you_know_title": "field_5dd55280a1e4b", "did_you_know_text": "Reach out to us if you need advice or support in the field of cybersecurity and risk management. Our specialist business advisors are happy to help you. > contact“, “_did_you_know_text”: “field_5dd55301a1e4c”, “did_you_know_subheader”: “Need advice or support in the field of cybersecurity?”, “_did_you_know_subheader”: “field_5dd553d50ff03” }, “align”: “”, “mode”: “preview” } /–>

11. Avoid…

Using publicly available charging cords to charge your phone. Publicly available outlets and USB ports are generally fine, but avoid using publicly available cords. These can be used to deliver malware.

12. Don’t…

Reuse the same username and password across multiple websites and applications. If you reuse the same username and password and a hacker gains access to one of your accounts, he/she may be able to access your other accounts as well.

13. Create…

And save bookmarks for the important banking and brokerage websites that you visit often to avoid inadvertently entering your credentials on a fraudulent site.

14. Consider…

Using a password manager. These apps create unique, complex passwords for you and then store those passwords in a cryptographically sound way.

15. Only…

Download applications from Google Play™ or the App Store® and never from a third-party app store. Third-party app stores, or apps that pop up and encourage you to download them, are much more likely to contain malware

16. Only…

Give applications the permissions they really need. Granting an application access to your photos, location, camera, contacts, etc. makes your data and information available to the application owner.

17. Limit…

How much information you share on social media, and lock down the privacy settings on your social media accounts. The information you share online could be exploited to gather information for fraud schemes.

18. Shred…

Financial documents before discarding them, as these contain valuable information that could be used by fraudsters. You may wish to leverage online statements and paperless options, like eSign, eDelivery, eAuthorizations and Digital Vault, as these include important security features. Additionally, secure your sensitive documents within your home.

19. Verify…

That you are using a current and reliable email provider that has basic, built-in security features. Using an older email account that has not incorporated security protections will greatly increase your likelihood of getting malware

20. If…

In doubt – delete!

Need advice or support in the field of cybersecurity?

Contact us if you need advice or support in the field of cybersecurity and risk management. Our specialist business advisors are happy to help you.

The opinions and views expressed in the above are those of the author only and are for guidance purposes only. The authors disclaim any liability for reliance upon those opinions and would encourage readers to rely upon more than one source before making a decision based on the information.

This website uses cookies

With these cookies, we and third parties can collect information about you and your internet behaviour, both within and outside our website. Based on this, we and third parties adjust the website, our communication, and advertisements to your interests and profile. You can read more information in our cookie statement.

If you opt for acceptance, we will place all cookies. If you opt for rejection, we will only place functional and analytical cookies. You can adjust your preferences at a later time.

Accept Reject More options

This website uses cookies

With these cookies, we and third parties can collect information about you and your internet behaviour, both within and outside our website. Based on this, we and third parties adjust the website, our communication, and advertisements to your interests and profile. You can read more information in our cookie statement.

Functional cookies
Arrow down

Functional cookies are essential for the proper functioning of our website. They allow us to enable basic functions such as page navigation and access to secure areas. These cookies do not collect personal information and cannot be disabled.

Analytical cookies
Arrow down

Analytical cookies help us gain insight into how visitors use our website. We collect anonymised data about page interactions and navigation, enabling us to continuously improve our site.

Marketing cookies
Arrow down

Marketing cookies are used to track visitors when they visit different websites. The goal is to display relevant advertisements to the individual user. By allowing these cookies, you help us show you relevant content and offers.

Accept all Save

Name

Subtitle
Developer
Location
They are focussed on creating a future-focused and relationship-driven culture, that keeps its promises to you, our team members, and partners.
Xeinadin