The first of our multi-part guide on Information Technology Privacy & Security.
Information Technology Privacy and Security is a big topic and its ever evolving! In this article, I’ll go through some basic tips and in future will delve deeper.
IT professionals are not the only ones who need to think about security and privacy issues. The truth is that everyone needs to understand security and privacy are issues.
“Security” refers safeguarding your data, whereas “privacy” is about safeguarding your identity.
Although the meaning of security and privacy are intertwined. It is possible to have security without privacy, but not possible to have privacy without security. We have become more and more dependent on technology. Which makes us more vulnerable to security threats.
Below are some simple 5 uncommon steps you can personally do to protect your own privacy and security.
More tips to come over the next few weeks!
1. Practice the Principle of Least Privilege (PoLP)
Only login to a computer with administrator rights if you must do so to perform tasks which needs admin privileges.
2.Use “pass-phrases” rather than “passwords”
The more characters your passphrase has, the stronger it is. The advantage is it’s easier to remember, but still hard for attackers to hack.
3.Enable Remote Device-Wiping
If your phone gets stolen, with this feature enabled, you could wipe out sensitive information remotely. If your phone does end up landing in the wrong hands, you can at least make sure they don’t get your information!
4. Disable Bluetooth when you’re not using it.
New vulnerabilities in radio technology are found all the time. Your Bluetooth usage minimises your exposure to very real vulnerabilities
5. Make your old computers’ hard drives unreadable
Information can be extracted from old computers, even if you wipe it! Always make the hard drives unreadable before disposing of/ selling the computer. We suggests physically destroying the hard drive.
Do you or your employees want to learn more about Cyber Security? Ask about our course on the subject here.
Leave a Reply