SOME TIPS ON PERSONAL CYBERSECURITY

In this second part of the interview, Reimers told us about some of the measures we have to take to avoid being victims of information theft and other forms of cyber attacks that may put our security or our assets at risk.
Update the system . The updates cover system failures, failures that can be exploited by hackers.

Always be a little suspicious. This will prevent us from falling into cheap tricks. If we receive an email that promises us a large amount of money in exchange for some data, for example, or if someone asks us for our password to download some information or other benefit, we must ignore the email and, if possible, not even open it .
Do not run the machines from the admin but as a user . The administrator has the credentials to install a virus. Therefore, unless you want to do a job that requires privileged administrator access, it is better to enter our sites as a simple user.
Having backups, not only in the cloud but in physical media . This avoids having to fall into the blackmail of those who install a ransomware (as happened with PEMEX) and encrypt our information.
Have an antivirus . The expert ensures that these programs are constantly updated and offer a fairly high level of security.
Have the same level of security on all your equipment . Many times, our laptops have fewer security measures than desktops. This, says Reimers, is a mistake. "If the hacker can't go through the door, he will try to go through the window."
It is important to note that “the risks are not eliminated: they are managed and minimized.” Therefore, any precautionary measure when using technology is more than relevant.

The expert also told us about bitcoins and other cryptocurrencies; He says that technologically they are very safe and that he sees a great future in them but his problem is rather financial, since they are very volatile and difficult to monetize in large quantities.

Comments

Popular posts from this blog

International English Language Testing System (IELTS)

Prevention and Recovery: How can security tools help?

How to increase visibility and mitigate risks in the corporate network?