top of page
  • Konstantinos Bagios

CYBERSECURITY - 10 measures against cyberattacks

Whatever the size of the company or whether you are an individual, basic IT security measures must always be in place. Globally, fraud affects more and more SMEs and VSEs less armed against these threats. What are the 10 essential measures that can be easily implemented?

Almost all formal and informal communications as well as financial transactions have been digitized. Digitization has made our life easier. But, it is also important to be aware of the threats and risks that this “Internet” medium presents. Attempts to steal user information, fraudulent use of credit / debit cards for online transactions, or hack social media accounts are some of the threats to cybermedia. So everyone at their own level can put in place measures according to their risk exposure. What are the main measures to adopt even at the level of small organizations?

# 1 Use a different password for each account

Even though it can get complicated with all the applications / software for which we use a password, using the same one everywhere can become a significant risk if a hacker manages to decode the password. This means that he will have access to all software (online shopping, banking, telephone, etc.), thus giving him control over the elements of your identity but also financial.

Thus, a different password for each account helps protect you. To not forget or be forced to write your passwords in a secret book, you can use programs specifically dedicated to password registration and management. Discover the 10 best tools 2020 in this article.

# 2 Important software like browser, payment wallet apps should be updated regularly

Updates are essential to keep your tools and apps secure. Each update often includes security updates to either correct detected flaws, update anti-virus information or even add layers of security.

To remember to update, most applications offer you to schedule the update automatically.

# 3 Avoid opening links to unknown lotteries, prizes, giveaways, or discounts.

Scams and attacks are often delivered via email messages that have a fraudulent link inserted with text that prompts you to click. The scenarios can be more or less well assembled and sent to several hundreds of thousands of computers, the scammers having every intention of targeting the victims who will have fallen into the trap.

It is therefore necessary to be wary of the recipients and of all the messages concerning lotteries, prizes or incredible discounts. Others will also present themselves as messages from taxes. The advice is never to click on links from unknown recipients and especially never to communicate your bank details.

# 4 Download all software from genuine sources, avoid downloading software (executable files) from torrent sites

Authenticity is a critical consideration when using the internet. Above all else, ensuring the authenticity of a product, service or download is essential. The best way to avoid downloading a fraudulent copy of a wanted program is to go straight to the genuine source and not through the use of Torrent sites.

# 5 When using third-party computers or mobiles for browsing, use private / incognito mode

It is so easy to leave your account registered on a computer that you have used and given access to who uses it to their information . The best way to avoid this type of incident is to use any computer outside of your organization in private / incognito mode.

# 6 When using third-party computers, use the virtual keyboard for your personal data

Even if some websites offer it or require it to enter your password, you can use the virtual keyboard of the computer for maximum security .

# 7 Use a good antivirus software suite No

need to have multiple antiviruses, choose one and take good care of its maintenance - run regular updates and schedule regular scans of your records.

# 8 When you connect to a website, check the URL (in the address bar), it should be exactly the same as the site you want to connect to

When surfing the internet, a great tip is always check the URL you're on. If you notice the little padlock it tells you that the website is referenced and verified.

# 9 Make sure the site URL displays theprotocol, https not http.

In addition to the padlock, a URL that starts with HTTPS means superior security for your visit. It is an HTTP data transfer protocol coupled with an additional level of security which allows to encrypt all the data exchanged between the client and the server, but also to confirm the identity of the website.

# 10 Two-factor authentication method

Currently, there is no more secure environment than two-factor authentication methods. They allow you to be even more protected because hackers must be able to simultaneously control two of your telecommunication means (computer + telephone).

To go further, you can be accompanied by professionals. They allow you to take a step back and take stock of the risks to which the company is exposed and to define the appropriate strategy according to the budget and the necessary level of security. This risk mapping exercise is very interesting for simultaneously identifying avenues for improving and securing the company's internal processes.



bottom of page