logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
F-Secure
2nd November 2018 by CyberVision 0 Comments 898 Views
2nd November 2018 by CyberVision in F-Secure

3 Ways to ensure cyber security hygiene

 

Operational Security is a great way to support a cyber security culture in your organisation, allowing employees to feel safer in their working space, but it can also lead to a false sense of invulnerability. People in general aren’t worried about cyber security, most being entirely too complacent about this mostly misunderstood and underestimated aspect of network safety. Everyone, in fact, needs basic pointers on security hygiene. Here are three of the best practices to implement if you are wanting to promote effective cyber security hygiene in your workplace.

 

  1. Always lock your laptop when you step away from it in a public space
    Laptops closed at 45-degree angle won’t go into sleep mode but wouldn’t seem readily available to passers-by. A nifty hacker plus a USB device and less than thirty seconds would equal a compromised machine. If you step away from your computer, even if your back is turned, lock it. If you’re going to step away for a while, shut the machine down so disk encryption is enabled. If you’re going to step away for longer than half-hour, take your PC with you.
  2. Do not use Bluetooth in a shared space
    Bluetooth is potentially an open door into your PC, much like your USB port. All that needs to happen is for someone to walk up to your PC and plug something into it for your device and its information to be compromised.
  3. Forget your local network before you leave
    The best practice would be to delete known or saved networks you’ll no longer use. Reset network settings after using a new or unfamiliar network.

 

Lax security hygiene is just as common in public spaces as it is in workplaces where people know their co-workers. Do not let your guard down. Security hygiene’s goal isn’t to stop a dedicated attacker but to make sure you’re not the lowest hanging fruit.

 

 

 

 

 

 

 

 

 

 

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • cyber security hygiene
  • f-secure
  • f-secure cyber security
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo