Each new year brings a slew of new year’s resolutions, but these need to be remembered on an on-going basis, else they will be forgotten in the course of daily life. Whether it is going to the gym, quitting smoking, or cutting down on the booze, the list is long, and noble. However, an important resolution that is often overlooked is cyber security.
Lutz Blaeser, MD of Intact Security, distributor of G Data security solutions, says securing PCs and mobile devices should be top of mind this year. “Those who ignore this, do so at their peril, and make it too easy for cyber crooks to carry out successful attacks.”
He says G Data is appealing to Internet users to check and make sure the security on their PCs, smartphones and tablets is up-to-date.
Eddy Williams, G Data security evangelist, says inadequately secured PCs and mobile devices make attacking users and stealing personal data child’s play for cyber criminals. “In this respect unclosed security holes due to out-of-date software and operating systems, and manipulated apps on mobile devices, make ideal gateways for the perpetrators. Users should therefore see the New Year as an opportunity to comprehensively secure PCs, smartphones and tablets.”
With this in mind, Blaeser says G Data has compiled a list of good security resolutions for 2014. “Firstly, the installation of a powerful security solution is a must, as this is one of the fundamental tools for any Internet user. Over and above virus protection, it needs to feature a firewall, spam and real-time protection against Web threats.”
Next, G Data advises to keep the operating system and all applications up-to-date by installing all available patches, service packs and updates. “Programmes that are obsolete and no longer supported by the vendor must be removed and replaced with the latest version.”
Blaeser says to delete online user accounts that are no longer needed, such as payment services, social networks, online shops and so on. “It is worth the time to keep a regular check on which of these are no longer in use, and delete those no longer needed. Passwords should be changed regularly. Whether for online shopping, social media, loyalty programmes – changing your passwords will greatly reduce the chance of being hacked.”
He adds that secure passwords consist of a random sequence of numbers, special characters and upper and lower case letters. He also advises to steer clear of terms that can be found in the dictionary as this will make it harder for cyber criminals to brute force hack your accounts.
Lastly, backing up data is essential. “Have a back-up of your valuable data in the event of an infection or a system hack. “ Furthermore, a system image backs up the entire hard disk with all installed programs. Powerful security solutions frequently include a backup module, so there is no longer any need to purchase any additional software.”
In terms of mobile devices, these are in equal need of protection. “Smartphones and tablets should also have a comprehensive security app installed, one that includes protection against malicious apps and secures the device against loss or theft. This would include being able to remotely wipe any sensitive information, and lock the phone from wherever you are.”
Finally, Blaeser says to only download apps from secure and reputable sources. “In addition, check the permissions with care. For applications that are already installed, a feature such as the clear permission checker in G Data Internet Security for Android will be of assistance.”