(Kris Tripplaar / Sipa USA / Newscom) A logo sign at an office building occupied by Check Point Software Technologies Ltd., in San Carlos, California on December 6, 2014.

Five Tips from Check Point

On the 33rd anniversary of Computer Security Day, Check Point Software Technologies Ltd. , a provider of cyber security solutions, provides five important reminders for of home and office IT systems.

ca: companies in silicon valley

(Kris Tripplaar / Sipa USA / Newscom) A logo sign at an office building occupied by Check Point Software Technologies Ltd., in San Carlos, California on December 6, 2014.

Since Computer Security Day began in 1988, the level of cyber threats has increased every year and the last 12 months saw the highest level of cyber breaches. New and more sophisticated threats, more , greater computing power and professional criminals, point to one thing, anyone with a computer, smartphone or IoT must now regularly think about cyber security, which unfortunately many do not. Especially today with the increase in remote work, each of us bears a certain level of responsibility when it comes to security.

For this reason, the following tips have been put together to provide guidance and assistance in protecting both our personal devices and corporate IT systems:

- Passwords are important: Passwords should be checked and updated regularly. However, experts disagree about the length and composition as well as the frequency of renewal. It is important for users to handle passwords carefully, not to store them unsecured in Excel spreadsheets, not to write them down in notebooks that anyone could find, or to stick them on the back of the keyboard. "1234" or "password" are not secure passwords.

- Phishing protection: Users should exercise caution before clicking on links that appear suspicious in any way, especially regarding the sender. They should also only download content from trusted sources, as phishing, a popular form of social engineering, has become the main means of ς. Ως εκ τούτου, εάν οι χρήστες λάβουν ένα μήνυμα ηλεκτρονικού ταχυδρομείου με ασυνήθιστο αίτημα, παράξενο αποστολέα ή ακόμα και , they should treat it with skepticism.

- Carefully select IT devices: Especially now with remote work, this is extremely important. The risk of a large-scale attack increases when employees use their personal devices, such as computers or , για σκοπούς που σχετίζονται με την εργασία τους. Το λογισμικό ασφαλείας θα πρέπει να εγκατασταθεί σε όλες τις συσκευές και η with the company network should be protected.

- Keep the software up to date: Hackers often find entry into applications, operating systems and security solutions, as they generally monitor and exploit any vulnerability. One of the best safeguards is to always use the latest version of any software – simple, basic but effective.

- Use multi-factor authentication: A process that many users are familiar with from their online bank accounts, for example, when requesting a TAN (one-time password) via mobile phone. In many cases, this connection method is now being introduced for applications and online retailer accounts to increase IT security. In this way, they have made it almost impossible for cybercriminals to gain access to the system despite knowing the password.

These tips already go a long way in protecting your own devices and your company from cyber attacks and . However, they should also be complemented by a comprehensive IT security architecture that unifies and centrally controls multiple solutions against different types of attacks. This covers all areas of IT security and can even thwart zero-day attacks. Finally, the strategy must be completed by training all employees up to the management level, including the training of specialists through special training programs and learning platforms.

All Check Point Software reports are at : https://blog.checkpoint.com/

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.
Check Point, iguru

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).