10 good cybersecurity solutions to adopt in 2022!

Today we know that for a password to be solid and robust, it is necessary to create a password that is long enough, complex, and above all that it is different on all the equipment and services to which you access, whether they are personal or professional.

10 good cybersecurity solutions to adopt in 2022!

1-Protect your access with strong passwords


Today we know that for a password to be solid and robust, it is necessary to create a password that is long enough, complex, and above all that it is different on all the equipment and services to which you access, whether they are personal or professional.

I use Dashlane, but there are many others. I will also add that whenever possible, enable two-factor authentication to strengthen the security of your accounts and devices. In the case of 2FA, I use Authy which I also presented a few months ago.

2-Back up your data regularly


The usefulness of backup is no longer to be demonstrated… It is essential.

The problem is often that users don't know how to back up or don't back up efficiently. If saving becomes a constraint, then it is quickly forgotten. In addition, we have more and more devices and it is not always possible to find an application that can back up all of our devices. It is important to regularly save the data from your PCs, mobile phones, tablets, and above all to keep these backups elsewhere than on one of these devices. The golden rule, I have already spoken about it here, is the rule of 3.2.1 :

Cloud solutions facilitate offsite backup. You can also use a NAS to set up your backup as I explain here. For family computers, Acronis is also a very good backup solution.

3-Apply security updates to all your devices (PCs, tablets, phones, etc.)


Updates, despite being often criticized, make it possible in particular to correct security flaws that could be used by hackers to break into your devices, to steal your personal information or your passwords, or even to destroy your data or even spy on you.

This is why it is important to update. In business, this activity is often neglected, which is why I support many professional customers in this task by automating the protocols for testing updates and deploying updates. 

In business, it is often your IT specialist who will take care of automating these tasks, for individuals, updates are generally configured by default to be carried out quickly, however, do not hesitate to check from time to time that is correctly installed.

4-Use antivirus 


Antivirus will protect your computer from most common attacks and viruses, but that doesn't mean you shouldn't be careful. Today Windows already provides a first layer of security with Windows Defender, however, if you want to go further, you can opt for one of the many paid antiviruses available on the market.

As part of a company with many computer stations, it is important to choose a solution that is not too resource-intensive, but above all a solution with an administration console that will allow you to retrieve all alerts. on a single supervision console. It is important to regularly check that your antivirus is up to date and that the scans are done regularly and correctly. 

5-Download your apps only from official sites


This may sound silly, but it is very good practice. Indeed, many sites will offer you your software by adding advertising or even worse integrating malware.

Do not hesitate to go directly to the publisher's website. This will greatly limit the installation of a booby-trapped application intended to retrieve your identifiers, encrypt your data, ask you for a ransom, etc. You can also go through the "Stores", which will allow you to have initial filtering of the part of the supplier (Microsoft Store, App Store, Play Store, etc.)

Similarly, avoid suspicious or fraudulent websites (downloading, video, illegal streaming) which could also install a virus on your equipment. 

6-Beware of unexpected messages


In 2021, I have never had so many customers who called me because they received an unexpected or alarmist message in their messaging service ( email) or via SMS (Fake email from the gendarmerie for summons, Fake email which explains that you have been recorded on the webcam, Scam to the president, etc…).

Indeed, these are quite common scams at the moment. If in doubt, always ask the sender for confirmation by another means if it seems known and legitimate to you or contacts your IT specialist. It may indeed be a phishing attack ( phishing )  to trick you to steal confidential information (passwords, identity information, or banking), sending a virus contained in an attachment you are tricked into the opening, or a link that takes you to a malicious site. 

7-Check the sites you shop on


Many of us now consume via the Internet, be careful however since many sites do everything to make you believe in the best offer, the best price or incredible bargains can be malicious. If it is a site that you do not know, do not hesitate to seek opinions on the latter and if you decide to buy on a site on which you have doubts, do not hesitate to see with your bank if you can pay with a temporary credit card number. Without this verification, you run the risk of having your credit card number stolen and never receiving your order, or even receiving a counterfeit or dangerous product.

8-Master your social networks


If you are a social network user, remember to follow me (Facebook, Twitter, YouTube) ????, but above all be careful about the content you can find there, and above all do not relay unverified information since unfortunately there are many Fake News.

Today, most of these networks allow you to control the data that you can share with others, in particular your data, photos, etc. Indeed, everything is not always good to share with everyone despite the social networks are excellent tools for collaborative communication and information.

9-Separate your personal and professional uses


With the increase in digital uses, the boundary between personal and professional use is often tenuous. These uses can sometimes even overlap. Hardware, messaging, "clouds"... It is important to separate your uses so that the hacking of personal access cannot harm your business, or conversely, that the compromise of your business cannot have an impact on the security of your data.

More and more software make it possible to make this split whether on PC or Smartphone. You can also create separate sessions based on personal or professional activities.

10-Avoid Public or Unknown Wi-Fi Networks


When you are away from home, whether at the restaurant, at the airport, or the hotel, it is tempting to use the free Wi-Fi network available. But as soon as possible, prefer the connection of your smartphone instead, today many of us have access to 3G and 4G, so, when possible, use this type of connection. When you are on your computer, do not hesitate to also use the connection sharing of your smartphone. 

Why? Well, free Wi-Fi networks are also called "public Wi-Fi" and there's a reason for that. Indeed, these networks are accessible to all and if they are badly configured, there is no "device isolation" and well you can quickly find yourself passing your data on the whole of this free network. Thus, if a malicious person were to launch a capture of network traffic, he could be likely to recover personal or confidential information (passwords, credit card numbers, etc.).

Other methods also exist since some hackers go so far as to simulate a free Wi-Fi network to be able to recover access to your data. You will quickly understand that it is highly inadvisable to use public networks.

When you have no choice but to use public Wi-Fi, then try to limit sensitive operations and use a VPN if possible!

We have seen together 10 good resolutions for your digital use, but these are not the only ones. And you, what good resolutions have you taken concerning digital?


What's Your Reaction?