Protecting Your Digital Assets

K2 Integrity
Contact

K2 Intelligence Investigations · Compliance Solutions · Cyber Defense

Protecting your digital assets is as important as protecting your physical assets. Never think, “It won’t happen to me”—everyone has something that cyber criminals can steal. Stay secure by following a few basic guidelines.

  • A long password is a strong password.
    • Do not use the same password for multiple accounts or create variations of that password. Each account should have a unique password that totals more than 15 characters.
    • Use a password manager to generate and store your passwords. Password managers save the passwords for all your accounts, so there’s no need for you to remember them.
    • Use a passphrase for accounts that you have to remember, such as the master password to your password manager. Create a phrase that you can remember but hackers can’t crack.
  • Think before you click.
    • Cyber criminals try to convince you that something bad will happen if you don’t respond to their tactics. They use threats and promises in emails to try to steal your passwords, information, and money. Be suspicious of phone calls and instant messages that seem unusual.
    • Phishing emails ask you to click on a link or open an attachment. Cyber criminals want you to download a virus onto your computer so they can see what you type and which websites you visit. They send realistic-looking emails asking you for your password so they can access an account. Because many people use the same or similar password for multiple accounts, one password might give hackers access to your entire online life.
    • Cyber criminals surf social media to find out information about you so they can send you targeted emails. Spear phishing emails can be difficult to spot because they focus on your personal or professional life.
    • Look for red flags on emails that have links and attachments, and ask yourself if the email is typical of those you normally receive from the sender. If you didn’t expect the email, do not click on links or open attachments without confirming the email’s authenticity. Text or call to confirm in case hackers have accessed the sender’s email account.
  • Keep work and personal email accounts separate.
    • Use your work email for work. Use your personal email for your personal life.
    • When you email your colleagues from both accounts, it’s more difficult for them to spot a phishing email sent by a hacker.
  • Be aware of your surroundings.
    • Don’t let strangers shoulder surf and read what’s on your screen. Cover your mobile phone and laptop with a privacy filter when you’re in public.
    • If your device is stolen, an easy-to-crack passcode could give a cyber criminal access to your information. Use a fingerprint to sign in and create a six- to eight-digit passcode.

 

Written by:

K2 Integrity
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

K2 Integrity on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide