Intelligent CXO Issue 29 | Page 22

EDITOR ’ S QUESTION

I

entered into the realm of cyber protection just over a year ago , and armed with greater access to worldwide cybercrime statistics , I found it necessary to evaluate my own practices – ones I ' ll share with you today .
First and foremost , whenever feasible , activate two-factor authentication . This introduces a second layer of security to your password access and promptly notifies you , often via phone , when access attempts are made .
Next , ensure your passwords are unique , alphanumeric and consist of a minimum of eight characters . The more characters you include , the tougher it becomes for hacking or guessing . Steer clear of using easily accessible information such as pet names , family names or street names . to breach your systems . As previously mentioned , keeping your software up-to-date is crucial to fend off new threats .
Subsequently , software updates play a pivotal role – keeping your software current is vital . This is because software vendors update their products to seal vulnerabilities as exploits emerge . Staying up-to-date with the latest patches goes a long way in safeguarding your information .
Backing up your data is paramount and the act of regularly backing up your data emerges as a critical practice . Safeguard your crucial data by backing it up to an external hard drive or the cloud and verify that your backups are encrypted . Your backups can be a lifesaver , ready to restore your data in the event of a cyberattack or unforeseen data loss .
STAYING UP-TO-DATE WITH THE LATEST PATCHES GOES A LONG WAY IN SAFEGUARDING YOUR INFORMATION .
I ardently recommend installing software intended to shield you from hacks , viruses , malware and more . In my case , I have a firewall , antivirus and antimalware programs for my systems . This represents one of your primary defences against malicious entities attempting
Exercise caution with phishing , as it remains one of the most prevalent methods of breaching defences . Be wary of unsolicited emails or emails containing links to seemingly legitimate sites that are likely fraudulent and designed to pilfer your data . As a practice , if I encounter an email urging action on an account , I shut the email and directly visit the account ' s official site to verify any issues .
Incorporating secure Wi-Fi hotspots and availing oneself of a VPN whenever possible infuses an additional stratum of protection into your cybersecurity regimen .
In conclusion , while no system is entirely foolproof , taking these additional steps to fortify yourself can spell the difference between being targeted by bad actors and staying off their radar .
Wishing you a cybersecure day !

KARL BATESON , DIRECTOR OF GLOBAL COMMUNICATIONS , ACRONIS

22 www . intelligentcxo . com