SlideShare a Scribd company logo
1 of 1
Download to read offline
TOP FIVE STEPS TO
STAYING SECURE
ENCRYPTION
Use encryption whenever possible. Use Full Disk Encryption
(FDE) for laptops or computers, which will automatically encrypt
everything on your hard drive. When browsing online, make sure
the address of the website you’re visiting starts with “https:” and
has an image of a closed padlock next to it.
YOU
The most important part to staying secure is you. Cyber attackers
have learned that the easiest way to get something is to simply
ask for it. As a result, common sense is your best defense. If an
email, message or phone call seems odd, suspicious or too good
to be true, it may be an attack.
UPDATING
Ensure your computer, mobile device and apps are updated and
always running the latest version of their software. Whenever
possible, enable automatic updating.
Passwords are the keys to your kingdom, guard them well.
•	 Always use long, strong passwords; the more characters 		
	 you have, the better. Even better, use two-step 			
	 verification whenever it is possible.
•	 Use a unique password for every device and account. Can’t 	
	 remember all of your passwords? Use a password manager 	
	 for securely storing and retrieving your passwords.
•	 Never share your passwords with anyone, including your 		
	 coworkers or your supervisor.
PASSWORDS
BACKUPS
Make sure you do regular backups of any important information.
Often, the only way you can recover from a computer or device that
has been hacked, lost or stolen is to recover from your backups.
Regardless of what technology you are using or where you are using it, here are five fundamental
steps you should take to protect yourself. Learn more at www.securingthehuman.org/ouch.

More Related Content

What's hot

How to keep your laptop & mobile safe
How to keep your laptop & mobile safeHow to keep your laptop & mobile safe
How to keep your laptop & mobile safekanika sharma
 
Protecting Children on the Internet
Protecting Children on the InternetProtecting Children on the Internet
Protecting Children on the Internetsmherma
 
Jeopardy
JeopardyJeopardy
Jeopardyzed_o07
 
Securing Yourself in the Cyber World
Securing Yourself in the Cyber WorldSecuring Yourself in the Cyber World
Securing Yourself in the Cyber WorldEmil Tan
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Safe computing (circa 2004)
Safe computing (circa 2004)Safe computing (circa 2004)
Safe computing (circa 2004)Azmi Mohd Tamil
 
Identity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyIdentity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyCoyleFinancial
 
Where To Start When Your Environment is Fucked
Where To Start When Your Environment is FuckedWhere To Start When Your Environment is Fucked
Where To Start When Your Environment is FuckedAmanda Berlin
 
Hacking By Nirmal
Hacking By NirmalHacking By Nirmal
Hacking By NirmalNIRMAL RAJ
 
Renfrow Internet Safety
Renfrow Internet SafetyRenfrow Internet Safety
Renfrow Internet Safetymrenfrow
 
China all up in your business: Annoying Persistant Threat - Dave Ockwell-Jenn...
China all up in your business: Annoying Persistant Threat - Dave Ockwell-Jenn...China all up in your business: Annoying Persistant Threat - Dave Ockwell-Jenn...
China all up in your business: Annoying Persistant Threat - Dave Ockwell-Jenn...OWASP Ottawa
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been HackedCyware
 
Malware Security
Malware SecurityMalware Security
Malware SecurityMike Ellis
 

What's hot (20)

Safe_IT
Safe_ITSafe_IT
Safe_IT
 
How to keep your laptop & mobile safe
How to keep your laptop & mobile safeHow to keep your laptop & mobile safe
How to keep your laptop & mobile safe
 
Protecting Children on the Internet
Protecting Children on the InternetProtecting Children on the Internet
Protecting Children on the Internet
 
Digital Security
Digital SecurityDigital Security
Digital Security
 
Jeopardy
JeopardyJeopardy
Jeopardy
 
Securing Yourself in the Cyber World
Securing Yourself in the Cyber WorldSecuring Yourself in the Cyber World
Securing Yourself in the Cyber World
 
Smartphone security issues
Smartphone security issuesSmartphone security issues
Smartphone security issues
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Digital security
Digital securityDigital security
Digital security
 
Safe computing (circa 2004)
Safe computing (circa 2004)Safe computing (circa 2004)
Safe computing (circa 2004)
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Identity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyIdentity Theft - by LINKS Technology
Identity Theft - by LINKS Technology
 
Where To Start When Your Environment is Fucked
Where To Start When Your Environment is FuckedWhere To Start When Your Environment is Fucked
Where To Start When Your Environment is Fucked
 
Hacking By Nirmal
Hacking By NirmalHacking By Nirmal
Hacking By Nirmal
 
Renfrow Internet Safety
Renfrow Internet SafetyRenfrow Internet Safety
Renfrow Internet Safety
 
Network Security
Network SecurityNetwork Security
Network Security
 
China all up in your business: Annoying Persistant Threat - Dave Ockwell-Jenn...
China all up in your business: Annoying Persistant Threat - Dave Ockwell-Jenn...China all up in your business: Annoying Persistant Threat - Dave Ockwell-Jenn...
China all up in your business: Annoying Persistant Threat - Dave Ockwell-Jenn...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked7 Signs that Tell your Computer has been Hacked
7 Signs that Tell your Computer has been Hacked
 
Malware Security
Malware SecurityMalware Security
Malware Security
 

Similar to STH-TopFiveSecuritySteps-TipsSheet

Essential Technologies for Psychologists
Essential Technologies for PsychologistsEssential Technologies for Psychologists
Essential Technologies for PsychologistsBradnor444
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnumARUN REDDY M
 
10 Essential Information Security Tips for Everyone
10 Essential Information Security Tips for Everyone10 Essential Information Security Tips for Everyone
10 Essential Information Security Tips for EveryoneAlex Grebeshkov
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Onlinepcsafe
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 
Digital security for journalists laurent eschenauer
Digital security for journalists  laurent eschenauerDigital security for journalists  laurent eschenauer
Digital security for journalists laurent eschenauerNelly Luna
 
Digital Security for Journalists
Digital Security for JournalistsDigital Security for Journalists
Digital Security for JournalistsLaurent Eschenauer
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Satyendra Arora
 
T3 conference talk nov 2014
T3 conference talk nov 2014T3 conference talk nov 2014
T3 conference talk nov 2014Sid Yenamandra
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts Sophos
 

Similar to STH-TopFiveSecuritySteps-TipsSheet (20)

Essential Technologies for Psychologists
Essential Technologies for PsychologistsEssential Technologies for Psychologists
Essential Technologies for Psychologists
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Secure End User
Secure End UserSecure End User
Secure End User
 
Internet security
Internet securityInternet security
Internet security
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
Internet
InternetInternet
Internet
 
10 Essential Information Security Tips for Everyone
10 Essential Information Security Tips for Everyone10 Essential Information Security Tips for Everyone
10 Essential Information Security Tips for Everyone
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Digital security for journalists laurent eschenauer
Digital security for journalists  laurent eschenauerDigital security for journalists  laurent eschenauer
Digital security for journalists laurent eschenauer
 
Digital Security for Journalists
Digital Security for JournalistsDigital Security for Journalists
Digital Security for Journalists
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
Personal security
Personal securityPersonal security
Personal security
 
T3 conference talk nov 2014
T3 conference talk nov 2014T3 conference talk nov 2014
T3 conference talk nov 2014
 
ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
 
Making Secure Choices
Making Secure ChoicesMaking Secure Choices
Making Secure Choices
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 

STH-TopFiveSecuritySteps-TipsSheet

  • 1. TOP FIVE STEPS TO STAYING SECURE ENCRYPTION Use encryption whenever possible. Use Full Disk Encryption (FDE) for laptops or computers, which will automatically encrypt everything on your hard drive. When browsing online, make sure the address of the website you’re visiting starts with “https:” and has an image of a closed padlock next to it. YOU The most important part to staying secure is you. Cyber attackers have learned that the easiest way to get something is to simply ask for it. As a result, common sense is your best defense. If an email, message or phone call seems odd, suspicious or too good to be true, it may be an attack. UPDATING Ensure your computer, mobile device and apps are updated and always running the latest version of their software. Whenever possible, enable automatic updating. Passwords are the keys to your kingdom, guard them well. • Always use long, strong passwords; the more characters you have, the better. Even better, use two-step verification whenever it is possible. • Use a unique password for every device and account. Can’t remember all of your passwords? Use a password manager for securely storing and retrieving your passwords. • Never share your passwords with anyone, including your coworkers or your supervisor. PASSWORDS BACKUPS Make sure you do regular backups of any important information. Often, the only way you can recover from a computer or device that has been hacked, lost or stolen is to recover from your backups. Regardless of what technology you are using or where you are using it, here are five fundamental steps you should take to protect yourself. Learn more at www.securingthehuman.org/ouch.