You are on page 1of 11

TIPS TO KEEP

YOUR
TECHNOLOG
Y SECURE
INTRODUCTION
If you connect your technology to a network or plug
in any type of portable storage device, there are bad
guys out there trying to attack you with viruses,
trojans, worms, spyware, keyloggers, ransomware,
adware, and rootkits.

The good news is that you don’t need to be a cyber-


security expert with detailed knowledge of attacks
and protection tools to protect yourself.
RISKS ASSOCIATED WITH
COMPROMISED CYBER
SECURITY
Successful cyber-attacks can be extremely expensive and
disruptive. It can impact you in many ways, like

Financial Risks - your bank and credit card accounts


might be drained

Identity theft

Data Loss & Data Breach


BASICS TO KEEP YOURSELF
SECURE There are five basic components to home and small
business security:

1.Secure wireless network credentials

2.A capable and properly configured firewall

3.Capable anti-malware software

4.Phishing attack awareness and avoidance

• In upcoming slides, we will discuss


all these in details 5.Backup
SECURE WIRELESS
NETWORK
CREDENTIALS:
Threat: When you first get your network router, it will
have a default username and password. If you do not
change them, your wireless network is vulnerable to a
fairly easy attack.

Solution: Change your router’s username and password


to secure ones and write them down somewhere secure.
FIREWALLS
A firewall is a network security component that
prevents unauthorized access to a network. It inspects
incoming and outgoing messages using a set of
security rules to identify and block threats.

Solution: Get a firewall is installed and properly


configured. ClickAway can help you put this layer in
place.
CAPABLE ANTI-MALWARE
SOFTWARE
The word “malware” derives from malicious software.
Malware is software designed to gain unauthorized
access to systems and then do harm. Its purpose might be
theft, extortion, damage, or disruption.

Solution: Invest in a paid version of any good anti


malware software.
PHISHING ATTACK AWARENESS AND
AVOIDANCE
Phishing is an attack that tries to fool you into giving a
hacker with malicious intent access to your technology. It
starts when you receive an email, phone call, or text
message that appears to come from a company or person
you know but is actually from a bad actor trying to get
access to your technology for malicious purposes.

Solution: The only effective protection is your awareness of


the risk, being skeptical of calls, emails, and text messages.
Also, don’t click on any unknow url or open any unknown
email.
BACKUP

Even if all the protection layers above are in place,


there is still a small probability that a new, novel
attack might succeed.

The last layer of protection is a current backup of your


valuable data or your entire system.
CONCLUSION:

The risk associated with cyber-attacks can be huge.


Protecting yourself is relatively easy, and the cost is
a small fraction of the risk. If you do not have all of
these layers in place, please take action now.
PRESENTED BY CALICK AWAY

Original Source:
https://clickaway.com/how-to-keep-your-technology-sec
ure-the-big-picture/

For More interesting stuff like this subscribe to


clickaway.com newsletter.

THANK YOU VERY MUCH!

You might also like