loader gif

10 Do’s and Don’ts for Effective Cyber Hygiene

10 Do’s and Don’ts for Effective Cyber Hygiene

Often, users--who leave their desktop or laptop unsecured when they go out refill their empty coffee cups--find that they’re locked out of the system, unable to login back into their system. We’re sure most of us have been in these shoes. However, when the IT guy helps you out and delivers an earful of policy-talk, you vow never to be careless that way again. But in a few days, you’ll see yourself doing the same mistakes. Therefore, we bring you some tips that will avoid yourself from having a face-palm moment again, when it comes to cybersecurity.

1) DO ensure that when you connect to a Wi-Fi, you are interfacing with the best possible network, also called SSID.

Do not accept that on the grounds that the name may sound similar to that of trusted source.

2) DO utilize passwords that incorporate a blend of upper and lower-case letters, including exceptional characters.

Do not utilize names/numbers of your puppy, relatives, road address and date of birth.

3) DO exploit double or multifactor authentication. Many Websites now offer securities past only a username and password, for example, a token, smartcard, PIN, or even user-selected security pictures that you will receive upon login.


Do not utilize username and passwords when different choices are available.

4) DO maintain a list of passwords in a protected place, and change them at least quarterly.

Do not keep similar passwords without changing them.

5) DO keep your corporate passwords isolated from your own passwords.

Do not continue reusing your personal password for your organization password, or the other way around.

6) DO ensure that your PC has the most recent patches and virus definitions updated.

Do not live in an assumption the endpoint security solution works never-endingly with PCs.

7) DO utilize cloud data systems to transfer and share non-confidential information.

Do not trust your friends, companions, family and partners with utilizing your PC in your absence.

8) DO download data onto removable media and store in a secure place.

Do not presume that another person has the obligation to keep up and secure your information.

9) DO check E-mails carefully to ensure that the source header is from a valid address.

DON’T fall prey to clicking a link to malicious Web sites that load malware into your computer.

10) DO establish a relationship with a reputable cybersecurity firm. Ask questions in advance about policy and procedures to keep your company safe on the Internet.

DON’T wait until you are confronted with an incident to seek advice.

loader gif