Category: Computers


Michael Joseph Pertuit cyber-security and electronic science guides today

April 30, 2022

Computers

Comments Off on Michael Joseph Pertuit cyber-security and electronic science guides today


Best PC and electronics and internet security tricks and tips by Michael Joseph Pertuit? If you work in a corporate office of any kind, you probably have to connect to an internal or local area network (LAN) at work. At a time where quite a few people, whose job affords them the capability, are now working from home, a VPN lets you connect to the office network and work remotely. You can access any confidential information you need that would otherwise only be available in the office. The data is encrypted as it travels to and from your home.

Michael Pertuit on internet security: Data backups ensure that if there is any data loss or theft, files can be recovered. You should always backup your data in a different location so hackers cannot access both areas and you should also backup your data regularly. Firewalls are designed to prevent unauthorized access from a private network. You can create a set of rules on your firewall so that it knows what to allow in and what to block out. A good firewall should monitor incoming and outgoing data.

Michael Joseph Pertuit on ransomware attacks: Use Strong Passwords & Use a Password Management Tool. You’ve probably heard that strong passwords are critical to online security. The truth is passwords are important in keeping hackers out of your data! According to the National Institute of Standards and Technology’s (NIST) 2017 new password policy framework, you should consider: Dropping the crazy, complex mixture of upper case letters, symbols, and numbers. Instead, opt for something more user-friendly but with at least eight characters and a maximum length of 64 characters. If you want to make it easier to manage your passwords, try using a password management tool or password account vault. LastPass FREE is a great tool for an individual. LastPass offers a FREE account and has a $2/month membership with some great advanced password features.

Michael Pertuit about data breach: A Malicious Insider. This person purposely accesses and/or shares data with the intent of causing harm to an individual or company. The malicious insider may have legitimate authorization to use the data, but the intent is to use the information in nefarious ways. Lost or Stolen Devices. An unencrypted and unlocked laptop or external hard drive — anything that contains sensitive information — goes missing. Malicious Outside Criminals. These are hackers who use various attack vectors to gather information from a network or an individual. Since malicious data breaches result from cyberattacks, you should know what to watch for.

Even “innocent” employees can cause security breaches, so no matter how small your company is, it’s vital that everyone is trained on all security issues. Require them to have strong passwords. Using the Internet for personal matters can lead to breaks, so make sure to have a very clear email and Internet use policy. Everyone should know to never open attachments or links in unsolicited emails. Require strong passwords that must be changed at least every few months. Your employees should also be aware that an attack doesn’t have to be web-based — hackers have been known to impersonate employees on the phone in order to get passwords and account information out of IT help desks. See extra details on https://www.dailymotion.com/MichaelPertuit.





Categories


Archives