Good cyber hygiene habits

Jollier

Professional
Messages
1,127
Reputation
6
Reaction score
1,108
Points
113
Good hygiene is what you are taught as a child and what usually stays with you for the rest of your life.
Have you heard of cyber hygiene? Of course, brushing your teeth and showering is not something traditionally associated with technology, but the term is a useful metaphor for the need to make smart decisions when using your smart devices.

Good hygiene is what you are taught as a child and what usually stays with you for the rest of your life. It includes three basic principles: using products and tools that meet your hygiene needs, performing those hygiene tasks correctly, and setting up a routine.
But what is cyber hygiene and what does it have to do with your computer and connected devices?

Cyber hygiene is about educating yourself to proactively perceive your cybersecurity - like your daily personal hygiene - to face cyber threats and network security issues. Unfortunately, cybersecurity is still not taken as seriously as cleaning your mouth and washing your hands before eating. Some people embrace cybersecurity as purely technological, but this may change as cyber threats continue to evolve. Meanwhile, establishing strict cyber hygiene rules should be as commonplace as brushing your teeth.
Here are some tips to help you and your family think about the right cyber hygiene practices.

Use the right cyber hygiene tools.
Have you ever tried brushing your teeth without a toothbrush? Without the right tools for the job, maintaining personal hygiene would be a little more difficult, if not impossible. The same is true for good computer hygiene management. Without the right products and tools, personal information that you believe is safe can in fact be at risk.
Reputable anti-virus software, network firewall and password protection help protect the personal data stored on your home computer. Taken together, these tools can help you feel confident about the security of your home computer, laptop, smartphone, and other devices.
In addition, before installing anything on your computer or other devices, you should always ensure that the manufacturer of the software and the place where you got it from is a reliable source.

Be careful, be careful with cyber hygiene.
Everyone should floss, right? But does everyone do it the way the dentist recommends? Files on your computer that seem to be permanently deleted require special attention from time to time.
For example, you might think that regularly emptying the trash can removes personal or confidential data from your hard drive. This is not true.
To permanently delete files from your computer, you must use a data cleaning software. Whenever you introduce new software, add hardware, or modify system files, you risk losing data. Get in the habit of regularly deleting unnecessary data and wiping it off your hard drive with a non-recoverable erase.
Another area of security that needs your attention is password protection. Don't be lazy or skimp on creating complex unique passwords for each account using combinations of 12 letters, numbers and special characters. Change your account passwords regularly and you will achieve better cyber hygiene immediately. If you are unable to remember all of your passwords, use special software called password managers.

Make cyber hygiene part of your routine.
Learning to regularly monitor your cybersecurity can increase your chances of avoiding online threats. But like any habit you want to make a habit, it requires routine and repetition.
Start by setting an alarm or tagging a calendar with dates for a number of tasks, such as scanning for viruses with antivirus software, updating operating systems on all your devices, checking for security updates, wiping your hard drive, and changing your passwords. Once you start mastering cyber hygiene, it becomes second nature to you.

Key steps for good computer hygiene.
Good cyber hygiene is a common practice that can help you keep your network safe, but there are a few guidelines to help you keep your cyber hygiene as safe as possible. Here are nine basic steps.

Step 1. Install reputable anti-virus and malware software.
The first and perhaps most important step is installing antivirus software. For what? Antivirus software is a program or suite of programs that scans and destroys computer viruses and other malware. It is a vital component of your overall cyber hygiene in protecting against security breaches as well as other threats.

Specifically, antivirus software provides protection by performing key tasks, including the following.
  • Identifying specific files for malware detection.
  • Scheduling and performing automatic scans.
  • Scan either one specific file, your entire computer, or a flash drive, depending on your specific needs.
  • Removal of malicious software.
  • Confirmation of the "health" of your computer and other devices.
Step 2: Use network firewalls.
Using a network firewall is another key habit for maintaining good computer hygiene. Firewalls are the first line of defense in network security, preventing unauthorized users from accessing your websites, mail servers, and other sources of information that can be accessed from the Internet.

Step 3: Update your software regularly.
Update your applications, web browsers, and operating systems regularly to make sure you are running the latest software that has fixed or fixed possible crashes. Setting this feature to update automatically will help keep you up-to-date with the latest protections.
These updates are especially important because they often include software fixes. Software developers release security fixes whenever they discover software flaws - flaws that viruses or hackers can exploit. Developers cannot always warn you when a critical patch has been deployed. Thus, regular updates will ensure that these patches will close any known holes in your software at the time of their release.

Step 4: Set up strong passwords.
Setting strong passwords for all of your devices is essential. Your passwords must be unique and complex, contain at least 12 characters, as well as numbers, symbols, uppercase and lowercase letters. Regularly changing your passwords is essential to reduce the likelihood of being hacked by intruders. Remember! Each password must be unique.
Additional device controls - firmware passwords. While disk encryption prevents cyber thieves from accessing information stored on your device, firmware passwords protect your hardware, preventing your machine from rebooting or resetting without your password.

Step 5: Use Multi-Factor Authentication.
Two-factor or multi-factor authentication is best practice and offers an extra layer of protection. Two-factor authentication usually requires you to provide your password and username, as well as, say, a unique code sent to your mobile phone. This may be all that is necessary for some systems, but multi-factor authentication adds additional layers of security using biometrics, such as facial or fingerprint recognition, to make it harder for hackers to gain access to your device and personal information.

Step 6: Use device encryption.
While most companies use data encryption processes automatically, you may also need to encrypt your devices and other media containing sensitive data, including laptops, tablets, smartphones, removable drives, backup tapes, and cloud storage. In fact, many devices use encryption by default for data stored on smartphones. Some apps use end-to-end encryption, while other services encrypt data on your devices and store it in the cloud. Another option is to use an encrypted USB stick to protect sensitive data.

Step 7: make backups regularly.
It's also smart to protect your files by backing up important files offline, to an external hard drive, or to the cloud. This can help protect against data loss, especially if hackers gain access to one of your devices.

Step 8: Keep your hard drive clean.
If you are selling your laptop, tablet or smartphone, it is important that your personal or confidential information is not transferred. If your device is jailbroken, a blank hard drive means less information to be accessed.
But simply deleting files or data may not be enough. Part of good cyber hygiene is reformatting and then cleaning your hard drive. For example, if you want to sell your computer and use it for online banking, you should consider Disk Cleanup to remove software and data from your hard drive.

Step 9: Protect your router.
Remember to secure your wireless network. This includes disabling and updating the default name and password that the router came from the manufacturer with, disabling remote management, and logging off as an administrator after setting it up. Also, make sure your router offers WPA2 or WPA3 encryption to maintain the highest level of confidentiality for information transmitted over your network.
Remember, it is wise to practice good cyber hygiene habits. If you set up reputable antivirus programs on your computer and other devices, keep them regularly updated, create strong passwords, and keep everything clean, you will be well on your way to creating cyber habits that can help you stay safe online.
 
Top