Cyber Defense eMagazine July 2021 Edition
Cyber Defense eMagazine July Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
Cyber Defense eMagazine July Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
3. Employ Multi-Factor Authentication<br />
If a threat actor has your password credentials, or you suspect to have given information to a malicious<br />
source, Multi-Factor Authentication is a great backstop. If a password is entered, access will not be<br />
granted until a second device can confirm the request, usually through a code or prompt on a smartphone.<br />
This is a simple tool that is often available via major email providers and Internet-based accounts, and it<br />
can deter a threat actor from accessing your information.<br />
4. Use Robust Passwords<br />
While “password1,” or “123456,” are easy enough to remember, the pain of losing access to your<br />
accounts is far worse than the pain of implementing complicated, unique passwords to begin with. Threat<br />
actors can attempt the most common passwords on accounts by the thousands. They scan for any easy<br />
vulnerabilities they can exploit on the Internet, and you can arm yourself with a strong password to deter<br />
them. Common guidelines for building a strong password include using at least 12 characters,<br />
implementing long phrases, and unconventional punctuation.<br />
5. Update, Update, Update<br />
While it may be inconvenient to learn how to deal with a new operating system or a new interface,<br />
updating as quickly as possible ensures your devices are running with the most recent protections. When<br />
threat actors search for vulnerabilities, they can configure nearly any attack to fit a port of entry, even if<br />
that entry only operates on a slightly out-of-date app, mobile device, or computer system. Having a fully<br />
functioning piece of technology from a few years ago is fine, but being sure to update its protection<br />
systems is a simple safeguard as threat actors remain persistent in COVID-19.<br />
While organizations continue to implement changes in the name of health and safety, it’s important to<br />
keep in mind that threat actors are actively working against them. In situations where people are working<br />
from a new home set up, people are grieving the loss of normalcy, and people are awaiting information<br />
regarding their health and their paychecks, threat actors are creating messages to manipulate them.<br />
While these are unprecedented times, and cyberattacks are more consequential than ever, there’s<br />
comfort in knowing that security best practices still stand, and awareness of these online scams prove<br />
as a great safeguard in and of itself.<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>July</strong> <strong>2021</strong> <strong>Edition</strong> 106<br />
Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.