With so many of us working remotely, the June issue of BarTalk is a digital-only issue. Watch for our next print issue in October. 

Security Dos and Don’ts

 

Security Dos and Don’ts

Here are a collection of security dos and don’ts, with links to relevant websites and resources. No amount of software can protect you unless it is combined with proper security policies that are updated as threats emerge and are enforced within your organization.

PASSWORDS:

STRONG PASSWORDS
Why you should use a strong password and how to get started using a password manager.

Strong Password GeneratorS
Gibson Research
Secure Password Generator

Password Strength Testers
The Password Meter
How Secure is My Password

Password Manager Software
LastPass remembers all your passwords, so you don’t have to
RoboForm Password Manager
Dashlane

Better yet, move to Multi-Factor Authentication. If you are on a Mac, then Keychain is already built into OSX (and can be shared on your different Apple products).

Security Tips:

DISABLE USB PORTS
Prevent malware from being introduced into your system via an infected USB drive.

Ransomware Protection
The 3-2-1 approach to defend against ransomware

The Best Antivirus Software for 2020
Install a top-rated product and keep it up to date

Why Software Updates Are So Important
Why it is important to install the latest versions of your operating systems and install all updates to protect against emerging vulnerabilities.

Canadian Zero-knowledge Cloud-Based backup solution
Sync encrypts your data in transmission and in storage and only you have the key to unencrypt your data — no one else can read or access your data. Plus, all your data remains in Canada.

The 10 Steps to CyberSecurity — by the UK’s National Cyber Security Centre
This site contains a host of articles, guidance, tips and more to protect an organization against threats.

SANS — Information Security Policy Templates
The SANS organization has long been a leader in education, resources, programs and much more in security and IT issues. Here you will find a host of information, including policy templates for twenty-seven important security requirements.

This is just a sampling of the steps and policies that can be taken to protect confidentiality, guard privacy (and prevent privacy breaches), harden technology and safeguard electronic data. The threat landscape is constantly changing as new threats emerge. Practice today means understanding the nature of the threats and how to best take precautions to guard against them.