SigMT

SigMT Vol12 Iss 4

Issue link: https://www.e-digitaleditions.com/i/1187514

Contents of this Issue

Navigation

Page 31 of 123

SiG MT 32 5 tips to protect your digital house 1. Remodel your digital house: Installing updates is an essential first step. ink of system updates as basic maintenance to your digital house that is keeping your personal data safe. It can be annoying to see those system update prompts on your computer or mobile device, but soware developers are constantly improving their soware to repel the latest malware. By keeping your operating system and apps updated, you are making sure that your digital house is as secure as possible. 2. Don't have a leaky house: Be wary of public Wi-Fi networks. Using public - and oen free - Wi-Fi networks is convenient, but it is a common entry point for criminals to use malware to infect your devices and apps. Use only networks you trust or use your own personal Wi-Fi hotspot if you have one. Never update your devices when you are connected to a public Wi-Fi network. 3. Keep your keys secure: Choose unique access credentials. Access credentials - usernames and passwords - are the keys that keep your digital house safe and secure. Select credentials that are unique and don't include personal identifying information such as a name, address or birthday. For added protection, choose two-step verification to access critical online accounts for your banking, retirement or investment accounts. Two-step verification is typically a key or another code provided by the service provider in addition to your primary access credentials to verify your identity. 4. Secure doors and windows: Use only secure websites and app stores. Web browsers and app stores are like the doors and windows in your digital house. Make sure they are secure by using web addresses that start with "https" and downloading apps only from the Apple App Store, Microso Store and Google Play store. 5. Don't open that door: Delete suspicious emails. at knock on your cyber front door is the sound of a cybercriminal sending you a phishing email. Be suspicious of emails that come from unknown senders. Use your cursor to hover over questionable links and email addresses to reveal the true identity of the link or sender. When in doubt, don't click on any links or open any attachments and delete the email immediately. S MT

Articles in this issue

Links on this page

Archives of this issue

view archives of SigMT - SigMT Vol12 Iss 4