14. Andmeturveː tehnoloogia, koolitus ja reeglid

 "Human is the weakest link in the information security chain" © almost every IT security specialist

In the digital age, one of the most important as well as the most difficult task is protecting personal data. Most often, the first thing you will see as a new user is the advice "do not show your username and password to anyone!". 

Nevertheless, the personal data is the main purpose of protection, there is, in addition to personal information,  exists other important information. It may be your project / dissertation / archive of the accounting report, which for some reason you have not yet sent to your boss. This information can be targeted by malefactors. They may use malware, that encrypts the contents of the hard drive and then demanding a ransom. This type of malware also known as ransomware.

However, although this scenario is terrible, there are a number of procedures that will avoid such a disastrous outcome.

1.Сopy the information to another storage medium besides your main hard drive, it can be a USB flash drive, external HDD/SSD, or even cloud storage. The more copies, the less chance of information loss. Of course, this increases the chance of "information leakage". In the case of confidential information, you should ensure that no one steals the flash drive, and that access to the cloud storage does not end up in the hands of third parties.

2.Update your operating system regularly. If the system says that an update is available, then you should not postpone it. It is possible that the developers have patched a hole in a vulnerability that could be dangerous for default user. An great example of human negligence is the Wannacry ransomware attack. Mostly it happened due to the fact that many people did not install an update that fixes a serious vulnerability in the system.

3.Install an antivirus program. Even though Windows 10 has its own antivirus system, there are many programs that do it more efficiently.

I'm not a security expert, but I think these three rules are enough to keep you safe against most malware.

Comments

Popular posts from this blog

11.loeng Arendus- ja ärimudel

8.IT proffesional... ?

1. Nädal. Noppeid IT ajaloost