Spring Cleaning with Cybersecurity in Mind

 

Protect Yourself, Your Data, and Your Digital Identity

By CMIT Solutions

The concept of spring cleaning typically applies to crowded closets, dusty cabinets, and cluttered shelves. After a long year spent leading much of our lives online, our digital identities deserve a little cleanup, too.

Just like the forgotten corners of your house, it’s easy to neglect certain parts of your digital existence. Old accounts may expire, forgotten files may pile up, and logins may lapse. Devoting a little attention to your smartphones, computers, and online identities now can keep you safe throughout the year. It can also improve the performance of your devices and enhance the cybersecurity protections that defend your data from hackers.

Below, you’ll find 10 of CMIT Solutions’ favorite tips for a reinvigorating digital deep clean.

1) Review all of your online accounts.

This sounds intimidating, especially given the number of applications most of us use. But it’s a critical part of any cybersecurity plan, as bad actors will often target neglected accounts to try and pilfer information or execute phishing campaigns. Make a quick list of all of your accounts, then delete or deactivate any that you don’t use anymore.

2) Lock down your login credentials.

Another piece of old information that can be leveraged by hackers is an old password. If it was set up more than 3-5 years ago, chances are it’s not nearly as secure as today’s passwords are required to be. Many of us were once accustomed to reusing the same password for multiple accounts, too—now, that’s the number one no-no when it comes to digital security. No matter how secure you think your passwords are, cybercriminals can find a way in by testing up to 10 billion password combinations in seconds. That’s why long, memorable phrases, special characters, and unique credentials are so important.

3) Implement multi-factor authentication (MFA) across all apps.

This requires something you know (your password) with something you have (a unique code sent via text message, email, or phone call)—and is another layer of security that’s become more common in recent years. Think of it like the DMV or another government office, where you have to present two forms of identification to prove who you are. Multi-factor authentication can prevent serious problems due to compromised passwords by throwing up another obstacle in the way of cybercriminals.

4) Be cautious with your private information.

In this dangerous online day and age, any request for private information—Social Security numbers, credit card details, or birthdates—should be met with immediate suspicion. Legitimate websites and apps never request such data via email or phone. But timely topics like COVID-19 vaccines, stimulus payments, and tax return filing deadlines give hackers a chance to try and trick you into divulging such important information.

5) Refresh your digital presence.

For some people, this step will come first. For others, it’s a dreaded task. But it’s important to prevent common social engineering scams and phishing attempts. Update your profiles on social media sites, review privacy and security settings on commonly used applications, and delete old photos or posts that may not align with who you are now.

6) Back up your data regularly.

Whether you’re affected by an accidental data leak, a purposeful data hack, or even a virus infection, one layer of defense can usually save the day: regular, redundant, encrypted, and automatic data backups that provide a reliable point of recovery. At CMIT Solutions, we securely store our clients’ data backups in a variety of physical and cloud-based locations to mitigate the risk of total data loss. We also integrate robust data recovery procedures with all data backup plans, helping companies retrieve their impacted information as efficiently as possible to support the return to day-to-day business operations.

7) Make sure devices, business applications, and web browsers are updated.

Many performance and security issues come from apps and operating systems that are too far behind current versions and lacking up-to-date software patches. This goes for any device connected to the Internet: PCs, smartphones, tablets, Wi-Fi routers, and even smart TVs. It also applies to cloud-based applications (think Microsoft Office or Adobe Creative Cloud) and web browsers, most of which will work best when updates are completed.

8) Securely dispose of old electronic devices.

You can’t just throw old computers or phones in the trash—for environmental and security reasons. Treat the disposal of electronic information as you would the shredding of sensitive paper documents. Anything that once retained protected details needs to be handled by a trusted IT provider or vendor so that logins, files, and other identifiable info is wiped and properly disposed of.

Comprehensive cybersecurity doesn’t come easy, but in this digitally driven day and age, it’s more important than ever. Whether you’re looking to secure desktop and laptop computers, mobile devices and backup drives, or online accounts and digital identities, CMIT Solutions can help. Contact us today so we can assist with your spring cleaning safely and securely.

Mary Ann Cordiano is the Owner of CMIT Solutions of Cleveland Downtown & East. For more information on her work, please visit: www.cmitsolutions.com/cleveland-downtown-east/. Connect with Mary Ann on LinkedIn.

 
Previous
Previous

‘Tech’ needs a human-centered redesign to create the inclusive environment we want

Next
Next

The Advisory Board: Is it right for my organization?