12 tips for protecting your data and internet-connected devices
Here are tips for keeping your email, accounts, and devices—including those that are connected to your organization’s network—safer from cyberattacks
Be skeptical of messages with links, especially those asking for personal information
Fake links and websites can be very convincing. Rather than trusting links, find a phone number on the sender’s official website so you can call them directly to confirm the message is legit.
Be on guard against messages with attached files
Never open unexpected attachments, even if they seem to come from people or organizations you trust. If you’re concerned that the message may be important, call the sender to verify.
Only share personal information in real time
It’s always best to share personal information in person or by phone. If you absolutely must email personal information, use Microsoft Outlook’s encryption tools.
Go passwordless and use an authenticator app for stronger security
Your password can’t be stolen if you don’t have a password. Turn on passwordless for your Microsoft account to sign in with your phone or Windows Hello instead.
If you must use passwords, make them strong and unique with a password manager
Strong passwords have at least 14 random characters and symbols. Use Microsoft Edge to remember passwords and manage password changes.
Enable the lock feature on all your mobile devices
Require a PIN, fingerprint, or facial recognition to unlock your device.
Install software updates immediately
Many app, browser, and operating system updates contain security fixes for currently active issues, so install them promptly to maintain the latest security standards.
Ensure all the apps on your device are legitimate
Only install apps from the official app store for your device.
Use Windows 11 and turn on Tamper Protection to protect your security settings
Always use the latest version of Windows. Tamper Protection blocks unauthorized changes to your security settings.
Reduce your attack surface
Eliminate unnecessary internet connections, restrict open ports, and use scanning tools to check your digital environment for potential weaknesses, so you can take action and mitigate risks.
Use your firmware scanning tools
Check your work environment for potential weaknesses so you can take action and mitigate risks.
Don’t transfer files that contain system definitions
Sending system definitions through insecure channels or for non-essential personnel can enable attacks to your digital landscape, corrupting your processes and making your environment vulnerable.
Did you find this article valuable?
Support Aditya Katira by becoming a sponsor. Any amount is appreciated!