1) Use the most recent version of applications. 2) Update your systems. 3) Change the default password on Internet connected devices.
1) Use a VPN on public WiFi networks. 2) Beware of fake access points. 3) Only use secured (encrypted) protocols.
1) Encrypt sensitive data on your computer and devices. 2) Use network shares with the most restrictive permissions. 3) Put a password on files transferred through upload platforms.
1) Don't use default usernames ("admin", etc.). 2) Use long passwords. 3) Limit the number of login attempts.
1) Analyze the domain name on senders' e-mail addresses and URL links. 2) Don't enter information on links that redirect you to a fake website. 3) Be aware that a known sender's e-mail address might have been spoofed.
1) Use unique passwords. 2) Use complex passwords without logic. 3) Activate 2FA when possible.
1) Never give confidential information on the phone (don't hang on, hang up). 2) Never trust strangers. 3) Double check identities in case of impacting demands.
1) Only download software from the trusted publisher's website. 2) Don't open files from unknown senders and never enable content. 3) Don't click on recommended actions on a webpage.
1) Share less on social media. 2) Configure privacy and security settings on your webbrowser and web applications. 3) Use an advertising blocker.