Fix Your PC Leaks

Five million files go missing every single day. We might think we know everything about internet security, but these breaches could have been avoided by following three simple steps.

Passwords are power

One of the biggest culprits at the moment is weakened credentials. That means passwords, passkeys and passphrases are stolen through phishing scams, key logging and brute-force attacks.

Passphrases are the new passwords. Random, easy-to remember passphrases are much better than passwords, as they tend to be longer and more complex. “MyDonkeysEatCheese47” is a complicated passphrase and, unless you’re a donkey owner or a cheese-maker, unrelated to you. Remember to make use of upper and lowercase letters as well as the full range of punctuation.

80% of all password breaches could have been prevented by multifactor identification: by verifying your personal identity via a text through to your phone or an email to your account, you can now be alerted when someone is trying to access your details.

Password tips:

  • Don’t be basic
  • Use different passwords for work and home
  • Don’t use your work email or password for LinkedIn
  • Bad memory? Try a password manager programme!

Backdoors & vulnerabilities

There was a 31% increase in software vulnerabilities in 2017. Cyber criminals use these as easy-access backdoors into your systems. Hackers are always on the look-out for sneaky ways in, and will walk straight through the gate if you leave it open for them.

But this can be avoided in your workplace.

Companies, like Secarma, can conduct penetration testing for businesses to find vulnerabilities in their systems. By poking and probing your system remotely, any flaws can be detected and fixed to keep your data soundly locked away.

Malware

Malware is malicious software used by hackers and other criminals to steal data.

What can you do?

Eight out of ten malware attacks target unpatched systems. A patch is a fix for a detected vulnerability. People need to install these patches as soon as possible, otherwise they are left open to malware which can be developed super-quick to exploit these gaps in the system.

It’s a race against the criminals: react fast.