13 Ways To Avoid Cyber Security Threats

avoid data security threats
Data Security Text with Padlock Icon - Red Button on Black Computer Keyboard.

13 Ways To Avoid Cyber Security Threats

 

 

In my previous article, I have discussed some of the facts that you need to know about phishing and Business Email Compromise generally. In this article, I want to look at some of the facts that you need to put into consideration in order to avoid cyber security threats. Follow me as we will look at that together in this article. 

 

Security threats come from everywhere, all over the world, 24 hours a day, 7 days a week, and 365 days a year. Moreover, human error is the root cause of almost every single data breach that happens worldwide. 

 

avoid data security threats
Now the steps…

 

  • Always follow the company policy and data handling guideline. If you are not sure about a policy, please ask. There are no dumb questions. 
  • You need to back up sensitive and critical information on an encrypted device with a strong password. 
  • Be aware of shoulder surfing or people who hang around your desk and act suspicious. They might be looking for confidential information or watch you as you enter your password. 
  • Do not write or leave passwords on notes posted on or under your desk, computer or keyboard. 
  • Keep your desk free of any proprietary or confidential information, and securely lock private information away in a desk drawer when you leave your work station for an extended period, and at the end of the day. 
  • Lock your computer screen and cell phone every time you step away to prevent anyone from seeing or manipulating confidential information on your device. 
  • Report broken doors, windows and locks to your security personnel as soon as possible. 
  • Report suspicious activity in or near your facility’s entry and exit points, loading docks parking areas, garages, and immediate vicinity, and always remember to lock your car. 
  • Report suspicious packages, and do not open or touch them.
  • Shred and destroy all documents that contain sensitive personal or organisational information rather than tossing them in the waste bin. 
  • Treat all devices such as a computer, CD ROM, USB Devices, and laptop as sensitive if they contain proprietary and sensitive data. Never share it with any unauthorised person, which include your family members.
  • Use your badge to enter your workplace and do not allow tailgaters. Check for identification and ask a lingering individual to identify the purpose of their visit to your workplace. 

Action Point

I know you might agree with some of the points that I have raised in this article. You might not agree with some of the issues raised. Let me know your views about the topic discussed. We will appreciate it if you can drop your comment. Thanks in anticipation.

 

 

Download Our App.

      

CEHNigeria On Google Playstore

Download Our Blog App On Google Playstore. 

 

Have a deeper understanding of Google Search Console. Use SEOPOZ

      

GET SEOPOZ. OUTSMART YOUR BLOG COMPETITORS

Have a deeper understanding of Google Search Console. Join SEOPOZ for free. 

Join Our Whatsapp Group Here

      

Join Our Whatsapp Group

Follow Us On Twitter and I will Follow Back

      

Follow Us On Twitter

Kindly follow me on Twitter and I promise I will follow back. Aside you all get updates when we post new articles. 

About Adeniyi Salau 788 Articles
I am an IT enthusiast and a man of many parts. I am a Certified Digital Marketer, Project Manager and a Real Estate Consultant. I love writing because that's what keeps me going. I am running this blog to share what I know with others. I am also a Superlife Stem Cell Distributor. Our Stem Cell Products can cure many ailments.

Be the first to comment

Leave a Reply

Your email address will not be published.


*


CommentLuv badge