Data security in 5 points

Optimize natural referencing

Come out covered! Young people have sex education classes to make them aware and protect them from certain risks. Unfortunately, in the digital age and smartphones, we can only observe that the majority of people do not have the basic knowledge about data security. Here are 5 basic points to consider.

1. Activate the 2-step validation process

The 2-step (or 2 factor) validation is the principle of receiving a second authentication factor that makes it impossible to access your account with the password alone. A mechanism that we all know from e-banking. The second factor being sent or generated on something physical. It is most often an sms received or a code generated on your mobile but it can also be a USB key, a checklist, etc. Although the vast majority of people do not use it – while most platforms offer it – it is the most effective way to protect access to your account from hacking and fraudulent access.

2. Use the cloud

The cloud is more secure. Period. Providers like Google, Amazon, Microsoft and others each have several hundred or even thousands of engineers whose only task is to make sure things are safe. Of course they can’t guarantee that you won’t be hacked, but their resources to prevent and react are unparalleled. By storing your data in the cloud, you are just one click away from locking their access to a device that you have lost, broken and stolen.

3. Cap the cloud with security solutions

If you are a company that mainly uses the cloud (e.g. with Office 365, G Suite), you can increase the security of your data by configuring the embedded options. For example, Google and Microsoft offer Mobile Fleet Management (MDM) with a wide range of options (device encryption, device security control, remote erasure, app control) as well as multiple ways to secure email, data access, etc. You can also top up your infrastructure with specialized solutions such as Cylance or FireEye so you don’t have to rely on a single system for security. 4. Use Lastpass Use a password manager such as 1password, Lastpass or Dashlane. These tools allow you to securely store your passwords and sensitive information (e.g. credit card number). They ensure that you use unique and strong passwords for each service. They have other advantages. For example:
  • share access with colleagues without them having to know the password. An employee leaving the company will not leave with passwords….
  • save time by letting the tool fill in the connection fields.
  • secure access to certain services by requiring the master password to be entered before automatic filling.
  • control the security of all passwords and generate secure and unique passwords with a single click

5. Ask questions

Ask your questions! It is only natural not to know. If you don’t know what 2 factor verification is ( well, now you know…), how clouds work, how to remotely lock your phone, can crypto viruses attack OneDrive or Drive, ask these questions. Do not stay on commonplace and false truths.

Conclusion

Don’t worry about the NSA, hackers in a dark room, the darknet… It’s just a tiny little piece of the “danger”. The real threats are the ones you face every day, which happen when you don’t expect them: theft, loss, ransomwares, scams.