Blog Layout

Cyber Security Cheat Sheet

Cyber Security Cheat Sheet


Nils Desmet • Jun 06, 2019
Nils Desmet • Jun 06, 2019

Before cybercriminals can wreak havoc on your computer system, they have to get past your security. By leveraging some basic safety strategies, you can protect your business from a cyber-attack. We’d like to share with you our Cyber Security Cheat Sheet. Consider this your security hygiene routine, like brushing your teeth. With regular checkups and daily accountability, you can keep your network and your database free of viruses, and avoid ransomware attacks and other unauthorized infiltrations. Here are our top ten tips.

1

Be curious, but be cautious. Nobody is going to send you $14M from Nigeria, I can assure you. Don’t just click the link or respond.

2

Update your software, especially your operating system and other programs, such as Flash and Java. These security patches protect you from being breached.

3

Take a Phishing Quiz and help detect bad emails. A good one is OpenDNS (https://www.opendns.com/phishing-quiz)

4

Use complex passwords. (12345 is not a good password dude!) Passwords should be dynamic and changed frequently. Finally, make sure access from mobile devices follows the same strict password requirements.

5

Don’t recognize an email? Delete it. Matters of national security are likely never sent to you via email, ever.

6

Sensitive data, such as credit cards, social security numbers, and any other client data, is sensitive and interesting for hackers. Handle with care and act responsibly.

7

Mobile devices can be hacked too! Update them.

8

Get that antivirus protection layer. But remember that is it just one link in the chain and not the entire solution.

9

Avoid “free software” at all costs. Nothing in the world is free, but you knew this already, didn’t you?

10

Backup you “schtuff” every day, or at least frequently. In the event something goes wrong, you have another version to go back to. The easiest way to back up your data is by replicating your information on to a separate service with scheduled updates. Unfortunately, if your secondary data system remains connected to your network, it can also be vulnerable to malware attacks as well as any incident, like fire or a power surge, that could damage your primary database. As a result, for many businesses, a cloud-based data storage system offers a cost-effective and secure alternative. By storing your information in the cloud, you gain extra security and the peace of mind that comes with knowing you can access your data whenever you need it.

We all know hacking and cyber-crime continually evolve, becoming more and more complex and challenging to defend against. That’s why at Makios, we deploy layered network security to stay ahead of the evolving threat landscape with a suite of powerful security services. We are here help educate and protect you.

You may also like

An envelope with a piece of paper and a red shield with a padlock on it.
By Nils Desmet 28 Mar, 2024
Learn the importance of DMARC in enhancing email security and how to implement it to protect against spam and phishing. It’s essential for businesses and email senders.
A screenshot of a web page with a list of next steps.
By Sarahi Miranda 13 Mar, 2024
Unlock the potential of Microsoft Loop with Makios Technology for seamless team collaboration and organization. Elevate your workflow effortlessly.
A dell desktop computer is sitting on a white surface.
By Ivan Flores 04 Mar, 2024
Discover the Dell Precision 3460 SFF, a powerful workstation designed for businesses. In our review, learn about its performance, design, and customization options.
a woman is holding a magnifying glass with the word scam on it.
By Nils Desmet 28 Feb, 2024
Protect yourself from scams and fraud with the help of Makios Technology. Learn how to identify potential scams and take legal action against them.
a telephone is sitting in front of a computer monitor
By Nils Desmet 13 Feb, 2024
Discover the key to success with our guide on creating and implementing a technology strategy that aligns with your business goals. Essential tips and steps are included.
a person is holding a cell phone in their hands in front of a laptop.
By Sarahi Miranda 06 Feb, 2024
Learn about the latest privacy and security features in iOS 17.3 for your iPhone. Keep your personal information safe and secure with these tips.
a man is sitting on the floor talking to a robot on a cell phone .
By Sarahi Miranda 26 Jan, 2024
Discover the top AI tools that businesses can leverage for efficiency, creativity, and gaining a competitive edge. Learn how to integrate these tools in 2024.
a person is holding a telephone next to a headset .
By Nils Desmet 16 Jan, 2024
See the advantages of Makios Cloud Phones with our comprehensive guide. Explore our models, their features, and the benefits they offer for optimal communication.
a man is standing in front of a computer monitor with an envelope with a red warning sign on it .
By Nils Desmet 10 Jan, 2024
Learn about spoofing, a common cybersecurity threat, and how to protect yourself and your organization from it. Contactus for more information.
a computer screen updating
By Nils Desmet 27 Dec, 2023
Explore the importance of software updates for system security through this comprehensive guide highlighting seven crucial reasons.
More Posts
Share by: