This week we focus on steps everyone must take to Protect IT.
By 2020, there will be an estimated 24 billion internet-connected devices globally – which is more than four devices for every person. Across the board, consumers have an increased understanding about the importance of privacy and want to know how their information and is being used and protected. As businesses learn to extract value from and utilize data at a deeper level, it is essential for organisations to be extremely conscientious about protecting personal information. Respecting consumers’ privacy is a smart strategy for inspiring trust and enhancing reputation and growth.
Simple Steps to Protect IT:
- If You Connect, You Must Protect. It is absolutely essential to update to the latest security software, web browser and operating systems. Turn on automatic updates and protect your devices with antivirus software.
- Stay Protected While Connected. Before you connect to any public wireless hotspot – like at an airport, hotel or café – be sure to confirm the name of the network and exact login procedures with appropriate staff to ensure that the network is legitimate. If you do use an unsecured public access point, practice good internet hygiene by avoiding sensitive activities (e.g., banking) that require passwords or credit cards. Your personal hotspot is often a safer alternative to free Wi-Fi. Only use sites that begin with “https://” when online shopping or banking.
- If You Collect It, Protect It. It is vital that businesses of all sizes keep business and client information safe. Follow reasonable security measures to keep individuals’ personal information safe from inappropriate and unauthorized access.
Suggested Links
Great Reading
Stay Safe on the Road Some really good tips on staying cyber safe while travelling.
Cyber Secure Home. Steps you can take to help make your home cyber secure.
Holiday Shopping Info Graphic Holiday shopping time is almost upon us. Here’s few tips to help keep you safe and protect your information.
Honey Stick Project Ever find a lost cell phone or USB stick? Did you look at the data on it? Well, you’re not alone…
Phishing Fact Sheet. The seven common clues you can use to help detect a phishing attack.