Some advice on how you can protect against security issues over the Internet.

Here is the big question: Do you know the risks, vulnerabilities that exist on the Internet? The information Systems Audit and Control Association (ISACA) define Cybersecurity as the "Protection of information assets, through the treatment of threats that put at risk the information that is processed, stored and transported by information systems that are interconnected".

Cybersecurity covers both the protection of people and the information, systems and processes on computers and mobile devices.

With the frame of reference settled, here are 10 computer security measures you need to take into account to enhance cybersecurity:

  1. Limit access to information: It is important that information is protected by limiting its availability. Some of the most common actions are to encrypt the information so that anyone who wants to access private data cannot do so without knowing the decryption key. In the case of companies, for business continuity, access to sensitive company data must be limited to workers.
  2. Secure and dynamic passwords: Although it may seem obvious, there are still users, in the era of digital transformation, who use passwords based on basic sequences such as 1234 or ABCD. For a password to be considered secure, it must be a minimum of 8 characters and contain at least one capital letter, numbers and special characters.
  3. E-mail protection: One of the security measures that is recommended is to use antispam filters, as well as message encryption systems. These actions will ensure the protection and privacy of the information stored in the email. The attack on emails is one of the most recurring threats and frauds in information systems.
  4. Perform secure backups and deletions: Periodically making backups or backup copies is another of the actions that must be done if we want to protect our database. In order not to lose data that interferes with the activity of any company, as well as photographs or personal content, it is essential to make backup copies from time to time. Although, just as important is reestablishing that information, as well as safely deleting information that is no longer useful.
  5. Access web pages and secure purchases: Another of the most common user errors is accessing web pages that do not have the https protocol in their URL. In addition to monitoring the URL, it is also important to look at the electronic payment methods offered by the website. More and more e-commerce companies include several verification processes within their payment gateway so that the transaction is as secure as possible.
  6. Cloud, network and local storage: The cloud is a virtual storage space that allows you to store all types of information. Now, being on the network it is vital that it is well protected against any targeted attack. Another data storage system that can be used is local storage, using physical devices, and network storage, which stores information on an internal network that can be accessed through permissions.
  7. Hire comprehensive security services and up-to-date updates: Although it may seem incredible, there are still users who do not have an antivirus installed on their computer terminals. Whether you are a company or an individual, you must have comprehensive security software installed such as antivirus, anti-spy or a firewall. You should always try to have the latest version.
  8. Monitor Wi-Fi Internet connections and navigations: Experts advise activating private modes in browsers and controlling and deleting cookies so as not to leave a trace of our activity on the websites visited. Another action that must be taken to preserve security in Internet access is not to connect to public Wi-Fi networks.
  9. Protect your mobile phone: Just as with the PC, we must protect all possible access to the mobile phone using patterns or passwords. In addition to bank details, there is also email, personal images and videos, private conversations in instant messaging applications. In addition to protecting the mobile phone using patterns, backup copies should also be made periodically to minimize the risk of data loss.
  10. Logout and Internet blackout: Other security measures that you should take during your online activity are to log out and turn off the internet if you are no longer going to use it. By disconnecting it you will reduce the possibility of suffering a computer attack. You can also use airplane mode, if you wish. In the case of access in public spaces, you must keep the remember password box in mind during registration. Never accept it, since this option is responsible for saving the password and anyone could enter, even if they do not know it.

Do you do any of these types of measures? Is there anything else that you do and share? Please let me know in the comments section. Thank you,

Francisco Sosa

Ingeniero en Liderazgo de Ingeniería y Mantenimiento Hotelero | Innovación y Sostenibilidad | Experto en Eficiencia y Tecnología

8 个月

Luis, gracias! por compartir!????

Paula Talavera

Empresaria Visionaria y Líder en Bienes Raíces de Alta Gama en Cancún | Fundadora de Everest Inmobiliaria | Experta en Ventas y Atención al Cliente con más de 25 A?os de Experiencia | Socia AMPI

9 个月

Luis, gracias! por compartir!!!

César Favian Ruiz

Director Operaciones y Finanzas@ Administradora Kuautli | MBA, Supply Chain Management

1 年

Luis Enrique Gómez Sutti This is one of the most important aspects that companies must take care of, unfortunately due to a lack of communication to users, classified information is exposed.

回复
Samaria Baltazar

Recursos Humanos | Capital Humano | HRBP ?? Con enfoque en procesos de RRHH

1 年

Luis Enrique Gómez Sutti, excellent recommendations, I agreed, there are companies that working rudimentarily their information and are exposed to suffer an attack on their security systems.? Thanks for sharing!

Jorge O. Kampfner Luna

Commercial Director | Consumer Channel | Business Development | Marketing | Retail | Wholesale | FMCG | Food & Beverages | Consumer Electronics | Strategic Planning | e-tailers | Marketplaces, and Omnichannel.

1 年

Sensitive task Luis Enrique Gómez Sutti, first of all, thank you for you post and advice. Shamely I must admit I am not carrying out even half of them.

要查看或添加评论,请登录

社区洞察