How Individuals Can Adopt a Strong Cybersecurity Posture

How Individuals Can Adopt a Strong Cybersecurity Posture

From Max Shier, CISO of Optiv:

“This year’s Cybersecurity Awareness Month theme is, “See Yourself in Cyber,” which could not be more relevant given the threat landscape we’re battling today. Most data breaches still are caused by individuals falling for threat actors’ tactics of phishing and social engineering, and individuals failing to follow basic cybersecurity best practices. Collectively, as an industry, we need to use the month of October to kick off an ongoing campaign that demonstrates the role each individual plays in both their own and their company’s security, as well as equips them with best practices to adopt a strong security posture. Here are a few practices that will ensure good cyber hygiene:

  • Update passwords regularly and use a strong, unique password for every account. To keep passwords difficult to guess, use combinations of at least 12 letters (upper and lowercase), numbers and characters.
  • Consider using multi-factor authentication (MFA), when possible. MFA is a method of authenticating into an account that requires users to present at least two pieces of evidence to prove their identity — something they know (e.g., a password), as well as something they have (e.g., an authentication code via text or email) or something they are (e.g., facial recognition or a fingerprint scan). Coupling a strong password with MFA will make it exponentially more difficult for cybercriminals to compromise accounts.
  • Slow down when reading emails and text messages and when listening to voice mails. The social engineers that craft phishing, smishing and vishing attacks are banking on the fact that people are busy and likely going to overlook red flags.
  • Report potential phishing/vishing/smishing attacks to corporate IT departments, or, in the case of a personal attack, other appropriate parties (e.g., email provider or FTC).
  • Update devices and software when prompted. Updates not only enhance features, but they provide security patches to address known vulnerabilities.
  • Turn off auto-connect for WiFi and Bluetooth to avoid accidentally connecting to a threat actor’s network.
  • Download software only from legitimate sources.
  • Thoroughly review the permissions mobile applications require before installing them.
  • Limit digital and social footprints. For example, refrain from “checking into” locations and tagging or sharing photos. Keep profile information to a minimum. And lastly, use a VPN and browse in incognito mode.
  • Keep informed of new cybersecurity risks, especially around smart technologies like wearable devices and WiFi-connected appliances.
  • Don’t forget about the Internet of Forgotten Things, those devices you’ve forgotten about but are still connected to your network.
  • Lastly, don’t forget about your home network and router; change the administrative password from its default and set the password to a strong password mentioned above, set up a Guest network for visitors, and only use WPA2 or the newer WPA3 protocols, if your devices support it.”

Featured

  • Maximizing Your Security Budget This Year

    The Importance of Proactive Security Measures: 4 Stories of Regret

    We all want to believe that crime won’t happen to us. So, some business owners hope for the best and put proactive security measures on the back burner, because other things like growth, attracting new customers, and meeting deadlines all seem more pressing. Read Now

  • Multifamily Manager Methodologies

    Property managers have their hands full, especially when it comes to establishing successful security systems on their properties. There are many pieces to the puzzle that come together for a property to protect itself properly. Read Now

  • The Recipe for Stadium Security

    The threat landscape of stadium security is fluid. Today’s venues and stadiums have operational security 24/7, hosting sporting events, community events, concerts, conventions and more – each with a unique visitor base and each with unique security risks. Read Now

  • Securing the Flow of Operations

    The transportation industry is a complex and dynamic environment where efficient management of physical keys, vehicles and shared devices is critical to ensuring smooth operations, reducing costs and maintaining security. Every day, more transportation facilities are using modern electronic key and asset management systems to better secure, audit and manage the important assets that keep operations running smoothly. Read Now

Featured Cybersecurity

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3