Title: Tips To Keep Your Technology Secure
1TIPS TO KEEP YOUR TECHNOLOGY SECURE
2INTRODUCTION
If you connect your technology to a network or
plug in any type of portable storage device,
there are bad guys out there trying to attack you
with viruses, trojans, worms, spyware,
keyloggers, ransomware, adware, and
rootkits. The good news is that you dont need
to be a cyber-security expert with detailed
knowledge of attacks and protection tools to
protect yourself.
3RISKS ASSOCIATED WITH COMPROMISED CYBER SECURITY
Successful cyber-attacks can be extremely
expensive and disruptive. It can impact you in
many ways, like
4BASICS TO KEEP YOURSELF SECURE
There are five basic components to home and small
business security
- In upcoming slides, we will discuss all these in
details
5SECURE WIRELESS NETWORK CREDENTIALS
Threat When you first get your network router,
it will have a default username and password. If
you do not change them, your wireless network is
vulnerable to a fairly easy attack. Solution
Change your routers username and password to
secure ones and write them down somewhere secure.
6FIREWALLS
A firewall is a network security component that
prevents unauthorized access to a network. It
inspects incoming and outgoing messages using a
set of security rules to identify and block
threats. Solution Get a firewall is installed
and properly configured. ClickAway can help you
put this layer in place.
7CAPABLE ANTI-MALWARE SOFTWARE
The word malware derives from malicious
software. Malware is software designed to gain
unauthorized access to systems and then do harm.
Its purpose might be theft, extortion, damage, or
disruption. Solution Invest in a paid version
of any good anti malware software.
8PHISHING ATTACK AWARENESS AND AVOIDANCE
Phishing is an attack that tries to fool you into
giving a hacker with malicious intent access to
your technology. It starts when you receive an
email, phone call, or text message that appears
to come from a company or person you know but is
actually from a bad actor trying to get access to
your technology for malicious purposes. Solution
The only effective protection is your awareness
of the risk, being skeptical of calls, emails,
and text messages. Also, dont click on any
unknow url or open any unknown email.
9BACKUP
Even if all the protection layers above are in
place, there is still a small probability that a
new, novel attack might succeed. The last layer
of protection is a current backup of your
valuable data or your entire system.
10CONCLUSION
The risk associated with cyber-attacks can be
huge. Protecting yourself is relatively easy, and
the cost is a small fraction of the risk. If you
do not have all of these layers in place, please
take action now.
11PRESENTED BY CALICK AWAY
Original Source
https//clickaway.com/how-to-keep-your-technology-
secure-the-big-picture/
For More interesting stuff like this subscribe
to clickaway.com newsletter.
THANK YOU VERY MUCH!