We recently saw an example of how dangerous cybercrime can be when Apple were forced to issue a warning to all their customers last month to immediately update their devices to IOS 15.6.1 following a major vulnerability discovery on their systems.
You may be worried about how you can keep your data secure and looking for what steps you should follow to avoid facing a cyber attack yourself? If so, you’re in the right place!
Following advice from professionals in the industry is the best way to stay up to date with how you can prevent being a victim of cybercrime. We spoke with Henderson Scott’s IT Director, Richard Caldicott about his best practices to protect your software and devices, including his top tips for password setting and security software recommendations!
What is your top tip for keeping your data safe?
Back up your data! We rely so much on our data, from website logins to holiday photos. There are so many ways to back up your information now, especially low-cost cloud-based services that you can literally set and forget that there’s really no excuses not to!
What computer security software do you recommend?
I’ve always been a fan of security products that offer multiple features in a single solution, so BitDefender gets my vote with Anti-Malware, Firewall, Password Managers and Secure VPN, it’s got everything you need.
What to remember when setting a password online?
I’m a big fan of Password Managers i.e. Keeper or 1Password, these products set a highly complex password for you that you don’t need to remember and store them in a safe location for when they are needed. If you don’t use Password Managers then there are 4 rules for setting a strong secure password:
1. At least 8 characters
2. Uppercase and Lowercase letters
3. A mixture of letters and numbers
4. Use at least one special character e.g. ! @ # ? ]
How can I check my information is secure on my computer?
2. Run Regular Malware and AntiVirus Scans
3. Keep your OS and software up to date
4. Use secure VPN tools where possible. This masks your internet usage, especially in public places.
5. Use Multi-factor authentication where available.