Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

[Infographic] Top 10 Security Tips
You are here: Home \ Security Practices \ [Infographic] Top 10 Security Tips
top 10 security tips
Posted on Thursday, March 31st, 2016 by

How can you avoid cyber threats and protect your data? Is your password secure enough? Are you safe from phishing, social engineering, and malware?

There are a few easy steps to follow to protect your personal and professional sensitive information. We have developed an infographic with the top 10 security tips to help you protect your data and prevent cyberattacks.

Hitachi Systems Security Top 10 security tips

1. Choose Strong Passwords

Make sure you have strong passwords that contain a minimum of eight characters that are a combination of numbers, upper and lower case letters and special characters. A very long password is better. It should not be a word from the dictionary. To make it easier to remember, compose a password by using the first letter of each word of a memorable sentence (a so-called “passphrase”).

 

2. Change Your Passwords Regularly

For optimal password security, make sure to change your passwords on a regular basis and keep them secret. Do not share your passwords with anyone or worse even, do not keep your passwords written down next to your desk.

 

3. Lock Your Session Every Time You Go Away From Your Computer

For Windows users, a fast way to do this is to simultaneously press THE WINDOWS KEY + L.

 

4. Clear Your Desk or Working Area

Always make sure that there are no confidential or valuable assets in plain sight on your desk or workstation. Anything confidential must be adequately secured.

 

5. Regularly Back Up Your Sensitive Data

One of the most effective security tips is to conduct regular back ups of your sensitive data and save your documents into the company network. Do not reply solely on your drive and do not back up confidential information on CDs, DVDs or USB flash drives, as there are easily lost, damaged or fall into the wrong hands.

 

6. Encrypt Your Confidential Emails and Files

Ask your company’s IT or security team what the appropriate means are to encrypt your confidential emails and files. Encryption translates data into a secret code, making the content of the message or file illegible by anyone unauthorized to read it. Remember that emails are not encrypted by default.

 

7. Beware of Social Engineering

The art of manipulating people to obtain confidential information is called social engineering. Be wary of unsolicited requests for confidential information and always verify the requestor’s identity.

  • Banks do not call their customers or send email messages asking for confidential information, such as account numbers, passwords, personal identification numbers (PINs), social security numbers etc.
  • Do not provide passwords or sensitive information when you respond to an unsolicited call, even if you recognize the displayed phone number. Phone numbers can easily be spoofed.
  • Do not click on any links or files included in suspicious email messages.
  • Only provide confidential information when you call your bank official customer service number or when you access the official website.

 

8. Delete Suspicious Emails

Do not reply when you receive suspicious emails and make sure you’re aware of the danger of phishing emails. Do not click on any links or files in :

  • Emails from unknown senders, non-business related.
  • Emails that seem to come from your bank asking for account information.
  • Emails from anyone with attachments that you don’t expect. Double check the sender and the purpose before opening any attachments.

If, by mistake, you clicked on a link or a file, do not delete the email and notify your security department immediately.

 

9. Comply With Your Company’s Security Policies

Make sure you are aware of your company’s security policies and periodically check for updates to make sure that you’re staying on top of the latest trends and best practices.

 

10. Report Security Incidents

When security incidents, security policy violations or suspected violations occur, always make it your best practice to report your observations to the information security department. Ideally, organizations should adopt a 24/7 monitoring and incident response management practice to ensure that confidential data is protected around the clock and security incidents are mitigated promptly and effectively.

 


Watch our webinar below to know how to protect yourself against from phishing attacks:

The Anatomy Of a Phishing Attack

Andrew Kozloski
About author:
I’ve been a geek since before I could walk. I remember loading video games on cassette tapes with my Commodore 64. I remember downloading games too, back when geeks programmed them for fun and gave them away for free on Bulletin Boards. I literally live on the internet: I’m an inveterate gamer, an electronic music producer and I’ve put in time in the video games industry in a variety of positions before finding my way to cyber security and ethical hacking, where I expect to spend the rest of my career. I’m passionate about coding, copyright, privacy, human rights and the intersection of these things. I am the Security Evangelist at Hitachi Systems Security.In my spare time I study languages (particularly Middle English and Russian these days) and I cook traditional Japanese food.

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More