How can self-protect your data against a cyberattack?

How can self-protect your data against a cyberattack?

When it comes to Internet security always think in large companies. Who will want to enter the computer of a professional simple? Or we ask ourselves what we can interest to cybercriminals? Perhaps the approach is wrong, and the question is why are not going to get into my computer if they can? Let’s see how can self – protect your data against a cyberattack.

Instead of comparing ourselves with a large company we would have to do with a normal user. If this suffer problems of viruses, malware or ransomware, self can also suffer them . If we insist we can have all our information encrypted within minutes. Therefore, it is essential to always have a backup of all our data in order to retrieve information.

how-can-self-protect-your-data-against-a-cyberattackIt is worth more than the information we need to be stored in the cloud, in the case of our laptop as on our phone that is basic to our daily lives. We cannot afford to lose our agenda , if for any reason our smartphone fails, rob us, etc. The same can say if we lose and fall into hands they should not.

The smartphone, a basic tool for self

Our phone has to be away from prying eyes. We cannot leave it on a table and that any review its contents. It is therefore essential that is protected by PIN code or if you have unlocked by fingerprint, the better. We must take into account the number of applications and data that could be accessed only unlock the phone.

In addition to choosing apps with which to work we have to find applications that can also be consulted from the web . Nothing will have a fantastic calendar app if losing the phone, we lose the information contained because we cannot use it from the computer. Of course we can replace the phone, re-download the app in the new and identify with our own to see if the data is, but in the meantime, we have a problem.

Another important precaution is not to connect to public WiFi that could be unsafe. It is not only that information from our terminal and Internet access point travel encrypted, but that share the same network as other devices in most cases. In this way an attacker might be right next to us and try to access our terminal without us being aware of it or an infected computer could spread the virus to others. This serves to both smartphones to laptops.

Finally it is essential to activate phone functions location. This way if we have forgotten we can try to retrieve or delete information remotely. Of course it has to stop being connected to the network, something that if we have stolen may be the first step taken by the thieves, turn off the phone.

The online services used by the autonomous

A very important aspect are the passwords of online services, both the phone and the laptop. They have to be safe and strong, different for each site and they are changed at least twice a year passwords. Problems with password theft as that has recently affected Yahoo! are not isolated cases.

Another basic rule is to not leave open sessions of services in the browser. Also , if you can delete cookies and history each time the browser, thus closing the session would close automatically while you do your browser. It is also important that when the team returns from suspension we ask for the password.

Always we think the danger is others, but in many cases we are. It is worth to have a second computer that can work if we have a problem. But also keep up on threats that are affecting. Being subscribed to a security blog or newsletter of our antivirus can be a good measure.

Finally, take advantage of the options your antivirus and do a full scan teams regularly.Many times a virus just wants to steal data and does not make the computer malfunction, simply go unnoticed. A review periodically can avoid some trouble. The important thing is that we try to make it harder for the bad guys.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.