The 10 commandments for a good Cyber Hygiene
To help you adopt good security habits, discover the 10 commandments for good digital hygiene.
1. You will duplicate your data regularly
Duplicating your data regularly on a second medium allows you to find your data in case of loss. The first storage medium is usually the local memory of your computer, the one you normally use. For the second medium, you can use an external service on the Internet (cloud computing), or an external hard drive. For the most important data, 3 different types of media may be required to multiply the sources of recovery in case one or more of the media are compromised.
2. You will update your computer equipment
Regularly updating your applications, servers, operating systems, computers, tablets, phones, and other IT tools will ensure that you are protected against vulnerabilities that have been identified and resolved by the vendors of these tools.
3. You will create a strong password
For your personal needs, there is no need to create a password that is complicated to remember, made up of special characters, upper and lower case, numbers. The National Institute of Standards and Technology (NIST) recommends a four-word password, such as a phrase that is easy for you to remember, but hard for others to guess. This ensures a high level of password security. Note that a password alone is not enough to properly secure the authentication process. Your employer or certain departments may have their own password complexity rules, which should of course be followed.
4. You will use multi-factor authentication
If offered, this authentication method allows you to log into a service, email address, or bank account using two ways to prove your identity. This greatly enhances the security of your account, even if your password is hacked, the password alone will not be enough to log into your account.
5. You will use a different password for each account
That way, if one password is compromised it doesn't compromise the other accounts. The impact of losing a password is therefore significantly reduced.
6. You will use a password manager
A password manager will allow you to generate and store your passwords securely. Be sure to use a strong password (see point 3) to access your password manager and if possible, enable dual authentication (see point 4).
7. You will disable geolocation
To avoid being tracked all the time, turn on geolocation only when you need it. Your geolocation data may be recorded and sold to third-party companies for marketing or surveillance purposes.
8. Depending on the context, you will use a virtual private network
It is recommended in some situations to use a virtual private network (VPN). to connect to your company network for example. A VPN allows to establish a communication tunnel between your workstation and remote servers. The goal is to protect your communications (confidentiality and integrity) thanks to the encryption of exchanges.
9. You will favour the use open source softwares
Open source softwares allows you to use free software solutions, but also to ensure the integrity of the source code. The source code is the DNA of a software. It is the programmers who, by developing the source code, make it possible to give birth to a software. If the source code is not open, then no external developer can access it and check it for Trojan horse malware. However, be sure to purchase the software from a source known for the quality and integrity of its services.
10. You will remain vigilant
You must always be vigilant: fraudsters can take advantage of your lack of vigilance to commit their misdeeds. For example, if you click on a link or attachment in an e-mail from an unknown source, this can have serious consequences
If you wish to go further in the prevention of cybersecurity risks, do not hesitate to contact our experts!