Search
  • Ready Services Group

Our Top 5 Cyber Security Habits



Building good habits is beneficial not only in life but in the realm of Cyber. Cybersecurity is built on a foundation of habits to keep you secure. We will be sharing our top 5 Cyber Security habits and why they will benefit you and your information in the long run.


1. Update Systems and Apps frequently.

This is crucial for your device’s survival. Updating apps and software like your Microsoft Office suite allows for your systems to patch any holes that could allow hackers to enter your system. Many updates that companies alert you about for their product is to fix any bugs that have been found and to keep your system secure. So, if you are operating off 2010 Microsoft Office it might be time for an update to keep yourself safe and secure.


2. Change your passwords often.

We know what you are thinking. “I won’t be able to remember all these passwords. I will just leave it.” We are here to tell you that this is the last thing you want to do. Changing passwords every few months can drastically decrease the chances that your password to your accounts will be guessed. Don’t forget one of our top password tips is use a mixture of lowercase, uppercase, numbers, and when allowed symbols to make your password even harder to guess.


3. Secure your network with a complicated and personalized password.

When you get a network installed in your home or place of business, they usually come equipped with a manufacturer generated password. Surprisingly enough, even though these passwords look complicated, they can be easily guessed. The way to avoid a password that can be randomly generated is to change it to something that you can remember that is personal to you and follows our top password tips.


4. Store information in the Cloud.

The Cloud is one of the most secure places to store your information. We recommend for businesses doing a Full Could Migration to best protect valuable information. The Cloud is not only for businesses to backup their information to, but for personal use as well. Microsoft offers a product called OneDrive that you can use to store photos, tax documents, medical bills, and other personal documents. Storing information in the Cloud also makes it easier to find. You can better search for you information than having to look through paper files.


5. Know the warning signs of phishing.

Knowing when to block a sender to prevent the download of ransomware can be exponentially beneficial in securing networks. Phishing can be easily identified by a few simple key concepts. First, if you receive a strange email claiming to be from someone you know and it contains attachments or links that the person tells you to open, check the physical email address to verify it is from the person, it says it’s from. If it is from that person’s email address but you are still unsure about the link or attachment, contact that person to verify that they sent it to you. Second, if the content of the email itself is strange and it is coming from a person that you do not know then block the sender and delete the email. If this occurs in your business’s email network, contact the IT department immediately to neutralize the threat. Knowing the warning signs of phishing can prevent Ransomware from being downloaded and threatening the security of your company’s information.


Written by: Ready Services Group Cyber Experts

8 views0 comments