centristic
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
  • Company
+1 (954) 488-2643
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
  • Company
centristic
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
  • Company
Blog
Home Uncategorized 9 Cybersecurity Tips to Keep Your Device and Data Safe
Uncategorized

9 Cybersecurity Tips to Keep Your Device and Data Safe

Roland Rodriguez January 11, 2021 0 Comments

Don’t let a cybersecurity incident ruin your New Year. Follow the tips below to help keep both your company-issued and personal device data safe in 2021.

Lock your devices. Lock your laptop and mobile devices using a fingerprint/face ID or PIN. This is your first line of defense in protecting your data if your device is lost or stolen.

Physically secure your devices. Never leave your device unattended. Do not put devices in checked luggage or leave them in hotel rooms. If you use your laptop in a public space consider using a privacy screen and a locking cable.

Use your own power adapters and cords. Public USB ports may contain malware that an attacker can use to access your devices and data. This could include USB ports in airports and hotel lamps.

Report lost and stolen devices. Immediately notify your company’s security officer or IT department if your company-issued device is lost or stolen.

Avoid public WiFi and disable auto-connect. Free WiFi is vulnerable to cyber-attacks. Turn off any auto-connect features on your devices to avoid inadvertently joining public WiFi. Turn off Bluetooth too as attackers can use this to gain access to your device.

Ensure your operating and security systems are up to date. This includes systems on your laptop and mobile devices (including apps). Using the latest anti-virus software is an effective way to protect your data. For company-issued devices, only use programs approved by your company.

Encrypt. Encrypt sensitive information on mobile devices. Laptops should have full-disk encryption.

Back-up your data. Before you travel, make sure your personal data is backed-up and secure. Check your company’s data back-up policies for information related to your company-issued devices.

Follow policies and procedures. If you travel, ensure that you remain compliant with your company’s security policies and procedures to protect your company-issued device and data.

119
851 Views
AboutRoland Rodriguez
IT security analyst with Centristic since 2014.
In Socials:
Home Office Security – Never Too Late to EvaluatePrevHome Office Security – Never Too Late to EvaluateNovember 18, 2020
CISA Launches Campaign to Reduce the Risk of Ransomware – Centristic Launches Campaign to Eliminate the RiskFebruary 2, 2021CISA Launches Campaign to Reduce the Risk of Ransomware – Centristic Launches Campaign to Eliminate the RiskNext

Related Posts

Uncategorized

Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability

Microsoft published guidance on Monday for a recently discovered zero-day security...

Roland Rodriguez May 31, 2022
Uncategorized

9 Cybersecurity Tips to Keep Your Device and Data Safe

Don’t let a cybersecurity incident ruin your holiday season. Follow the tips below to...

Roland Rodriguez January 11, 2021
Recent Posts
  • A zero-day vulnerability was discovered in Google Chrome 
  • Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
  • Cybersecurity Threat Advisory: BlackMatter Ransomware
  • CISA Launches Campaign to Reduce the Risk of Ransomware – Centristic Launches Campaign to Eliminate the Risk
  • 9 Cybersecurity Tips to Keep Your Device and Data Safe
Categories
  • Data Breach
  • tipsEmail Scams
  • HIPAA
  • newsNEWS
  • tipsPhishing
  • phishRansomware
  • Security
  • Tips and Tricks
  • Uncategorized
Search our Site

Centristic delivers the industry’s most complete IT security and secured solutions to small cap business. Whatever your IT security needs and goals, and wherever you’re starting,

Quick Links
  • Solutions
  • Services
  • Support
  • Company
  • Blog
Get In Touch

Adress:
5645 Coral Ridge Dr #230 Coral Springs, FL 33076-3124
Phone:
+1 (954) 488-2643
Business Hours:
Monday – Friday: 9am to 6pm
Saturday – Sunday: Closed

Copyright © 2020 Centristic. All Rights Reserved