{"id":5878,"date":"2022-02-07T13:51:25","date_gmt":"2022-02-07T13:51:25","guid":{"rendered":"https:\/\/www.xploregroup.be\/?p=5878"},"modified":"2024-05-31T12:14:05","modified_gmt":"2024-05-31T12:14:05","slug":"10-commandments-to-live-and-work-safely-digitally","status":"publish","type":"post","link":"https:\/\/www.xploregroup.be\/en\/10-commandments-to-live-and-work-safely-digitally\/","title":{"rendered":"10 commandments to live and work safely digitally"},"content":{"rendered":"\t\t
Companies massively invest in effective security for their networks and data.<\/p>
However, we’re all human. <\/em>Human error is still the biggest cause of cyber-attacks on businesses. Therefore, it\u2019s important for all of us to be aware of the potential threats that are lurking.<\/p> \u00a0<\/p> Sometimes it’s the little details we forget that can make a big difference when it comes to cybersecurity. We present you 10 tips to live and work safely digitally.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t What was the password again? <\/em>Yes, we must remember so many different passwords nowadays. Sometimes it’s tempting to use a single password for everything. But trust us – don\u2019t do that.<\/p> To make your life easier, there are many password managing tools that allow you to store all your passwords in a responsible and safe way. Never share a password with anyone – not on a piece of paper, not by e-mail -, just don’t do it.<\/p> \u00a0<\/em><\/p> Did you know cybercriminals can also impersonate one of your colleagues? Always be alert and check the sender’s e-mail address before opening an e-mail and do not click on any links. Be critical about the timing: you weren\u2019t expecting an e-mail from this colleague on this subject? That should ring a bell.<\/p> \u00a0<\/p> Have you become a victim of hacking or phishing? Notify your security administrator right away. Making mistakes is human and the longer you wait, the bigger the problem will become!<\/p> \u00a0<\/strong><\/p> A two-step verification method adds an extra layer of security on top of your username and password. In addition to your password, you have to confirm your identity via another trusted device, in most cases your smartphone. A sometimes tedious task, but it keeps you one step ahead of hackers.<\/p> \u00a0<\/p> When using unsecured WIFI hotspots your data is not safe at all. Hackers can easily access any information you send to the internet through these networks. Still want to use a public WIFI network, for example at a hotel? Try doing so via a VPN connection.<\/p> \u00a0<\/p> Flexible workspaces are currently very popular and for good reason – they are hip, accessible and offer the chance to network and grow your business.Leaving your desk for lunch? Always lock your screen.<\/p> \u00a0<\/p> Whenever possible, don’t leave your PC unattended – not even in the boot of your car when it’s parked on the street.<\/p> \u00a0<\/p> Update pop-ups always seem to come at a bad time but keeping all your devices’ software up to date is more important for security than you might think. Every update contains fixes for potential security threats. It\u2019s well worth your time.<\/p> \u00a0<\/p> We cannot stress the importance of this enough. Don\u2019t use a code or password that is too easy to guess – see tip 1! Think about your own home, for example – \u00a0do you leave your doors and windows open? If you want to be sure that your data is protected in case of theft, use disk encryption software. This kind of software ensures that your data is only accessible with a unique key.<\/p> \u00a0<\/p> Antivirus software offers good protection to keep scammers at bay. The best packages on the market can be expensive, but better be safe than sorry, right? A hacker asking for ransom will cost you much more.<\/p> \u00a0<\/p> There is still a lot of printing going on in this digital world. You can even print something from home for a colleague who is in the office at that very moment. Handle this carefully, because in many companies many people have access to the same printer.<\/p> Always avoid leaving documents on a printer for no reason. Think carefully whether you really need a document on paper.<\/p> In short<\/strong>: not printing is safer and better for the environment. Win-win!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t Author: Xplore Group<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t In 2022 we are increasingly working digitally from everywhere. Hybrid working offers us many advantages and is here to stay – but it also makes company-sensitive information more vulnerable to ever-increasing cybercrime.<\/p>\n","protected":false},"author":1,"featured_media":5879,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[37],"tags":[33],"class_list":["post-5878","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-live","entry"],"acf":[],"yoast_head":"\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
1. Use secure and unique passwords, and never share them with anyone<\/strong><\/h4>
2. Beware of phishing mails <\/strong><\/h4>
3. Report any problems immediately to your security administrator<\/strong><\/h4>
4. Use two-step verification<\/strong><\/h4>
5. Stay away from public WIFI networks<\/strong><\/h4>
6. Lock your screen and don’t leave your PC unattended<\/strong><\/h4>
7. Just do those software updates already!<\/strong><\/h4>
8. Use an access code or password on all your devices<\/strong><\/h4>
9. Use a virus scanner<\/strong><\/h4>
10. Think before you print<\/strong><\/h4>