How Individuals Can Adopt a Strong Cybersecurity Posture

How Individuals Can Adopt a Strong Cybersecurity Posture

From Max Shier, CISO of Optiv:

“This year’s Cybersecurity Awareness Month theme is, “See Yourself in Cyber,” which could not be more relevant given the threat landscape we’re battling today. Most data breaches still are caused by individuals falling for threat actors’ tactics of phishing and social engineering, and individuals failing to follow basic cybersecurity best practices. Collectively, as an industry, we need to use the month of October to kick off an ongoing campaign that demonstrates the role each individual plays in both their own and their company’s security, as well as equips them with best practices to adopt a strong security posture. Here are a few practices that will ensure good cyber hygiene:

  • Update passwords regularly and use a strong, unique password for every account. To keep passwords difficult to guess, use combinations of at least 12 letters (upper and lowercase), numbers and characters.
  • Consider using multi-factor authentication (MFA), when possible. MFA is a method of authenticating into an account that requires users to present at least two pieces of evidence to prove their identity — something they know (e.g., a password), as well as something they have (e.g., an authentication code via text or email) or something they are (e.g., facial recognition or a fingerprint scan). Coupling a strong password with MFA will make it exponentially more difficult for cybercriminals to compromise accounts.
  • Slow down when reading emails and text messages and when listening to voice mails. The social engineers that craft phishing, smishing and vishing attacks are banking on the fact that people are busy and likely going to overlook red flags.
  • Report potential phishing/vishing/smishing attacks to corporate IT departments, or, in the case of a personal attack, other appropriate parties (e.g., email provider or FTC).
  • Update devices and software when prompted. Updates not only enhance features, but they provide security patches to address known vulnerabilities.
  • Turn off auto-connect for WiFi and Bluetooth to avoid accidentally connecting to a threat actor’s network.
  • Download software only from legitimate sources.
  • Thoroughly review the permissions mobile applications require before installing them.
  • Limit digital and social footprints. For example, refrain from “checking into” locations and tagging or sharing photos. Keep profile information to a minimum. And lastly, use a VPN and browse in incognito mode.
  • Keep informed of new cybersecurity risks, especially around smart technologies like wearable devices and WiFi-connected appliances.
  • Don’t forget about the Internet of Forgotten Things, those devices you’ve forgotten about but are still connected to your network.
  • Lastly, don’t forget about your home network and router; change the administrative password from its default and set the password to a strong password mentioned above, set up a Guest network for visitors, and only use WPA2 or the newer WPA3 protocols, if your devices support it.”

Featured

  • CISA Kicks Off 20th Anniversary of Cybersecurity Awareness Month

    CISA Kicks Off 20th Anniversary of Cybersecurity Awareness Month

    The Cybersecurity and Infrastructure Security Agency (CISA) recently announced the kickoff of the 20th Cybersecurity Awareness Month. Throughout October, CISA and the National Cybersecurity Alliance (NCA) will focus on ways to “Secure Our World” by educating the public on how to stay safe online. Read Now

  • Cybersecurity Awareness Month: Top Five Action Items to Elevate Your Data Security Posture Management and Secure Your Data

    October is Cybersecurity Awareness Month, and every year most tips for security hygiene and staying safe have not changed. We’ve seen them all – use strong passwords, deploy multi-factor authentication (MFA), be vigilant to spot phishing attacks, regularly update software and patch your systems. These are great recommended ongoing tips and are as relevant today as they’ve ever been. But times have changed and these best practices can no longer be the bare minimum. Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3