01.07.2021 Views

Cyber Defense eMagazine July 2021 Edition

Cyber Defense eMagazine July Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine July Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3. Employ Multi-Factor Authentication<br />

If a threat actor has your password credentials, or you suspect to have given information to a malicious<br />

source, Multi-Factor Authentication is a great backstop. If a password is entered, access will not be<br />

granted until a second device can confirm the request, usually through a code or prompt on a smartphone.<br />

This is a simple tool that is often available via major email providers and Internet-based accounts, and it<br />

can deter a threat actor from accessing your information.<br />

4. Use Robust Passwords<br />

While “password1,” or “123456,” are easy enough to remember, the pain of losing access to your<br />

accounts is far worse than the pain of implementing complicated, unique passwords to begin with. Threat<br />

actors can attempt the most common passwords on accounts by the thousands. They scan for any easy<br />

vulnerabilities they can exploit on the Internet, and you can arm yourself with a strong password to deter<br />

them. Common guidelines for building a strong password include using at least 12 characters,<br />

implementing long phrases, and unconventional punctuation.<br />

5. Update, Update, Update<br />

While it may be inconvenient to learn how to deal with a new operating system or a new interface,<br />

updating as quickly as possible ensures your devices are running with the most recent protections. When<br />

threat actors search for vulnerabilities, they can configure nearly any attack to fit a port of entry, even if<br />

that entry only operates on a slightly out-of-date app, mobile device, or computer system. Having a fully<br />

functioning piece of technology from a few years ago is fine, but being sure to update its protection<br />

systems is a simple safeguard as threat actors remain persistent in COVID-19.<br />

While organizations continue to implement changes in the name of health and safety, it’s important to<br />

keep in mind that threat actors are actively working against them. In situations where people are working<br />

from a new home set up, people are grieving the loss of normalcy, and people are awaiting information<br />

regarding their health and their paychecks, threat actors are creating messages to manipulate them.<br />

While these are unprecedented times, and cyberattacks are more consequential than ever, there’s<br />

comfort in knowing that security best practices still stand, and awareness of these online scams prove<br />

as a great safeguard in and of itself.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>July</strong> <strong>2021</strong> <strong>Edition</strong> 106<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!