Three basic steps to protect yourself against cyber-attack framework
1) Enable Multi-Factor Authentication
Multi-factor authentication is one of the most effective ways to protect against someone accessing your data without authorisation. While a username and password provide some protection, multi-factor authentication enhances the security by adding the need for a code from a separate device.
For more information, see: https://www.cyber.gov.au/mfa
2)Software protection
a) Software updates
Producers of other application software often release updates to the software. These updates may include bug fixes, security fixes and general improvements. Maintaining critical applications at fully supported versions, including all latest updates, is essential to reduce cyber security risks.
Software that should be kept up to date includes:
- Operating systems (Windows, Mac OS etc.)
- Microsoft Office
- Other applications – web browsers, email clients etc
Most software can be configured to download and install highly recommended updates automatically. For details on how to turn up automatic updates, see: https://www.cyber.gov.au/acsc/view-all-content/advice/software-updates
b) Antivirus / Antimalware
Good cyber security requires active malware and antivirus software. If this is not installed or not automatically started at system startup and continues to run uninterrupted, there is zero automated cyber security! It is essential that malware and antivirus software is installed and runs automatically from system startup.
Generally, subscription-based antivirus programs offer more excellent projection through enhanced detection methods.
For more details on antivirus, see: https://www.cyber.gov.au/acsc/view-all-content/advice/anti-virus-software
3) Backups
Data storage devices degrade over time and are more prone to data corruption as they age. More importantly, from a data integrity and availability perspective, data changes can be made by people and software. It is not uncommon for people to change (and even delete) data in ways that are unexpected to them and others, while software with bugs can also modify or delete data in uncontrolled ways.
For these reasons, data backups are essential. Backups provide a means to restore a known state of data at a specific time. To minimise data loss from any event that may cause undesirable data changes, backups need to be taken regularly and well-designed.
OneDrive or Google drive can be used to backup files to cloud storage. For Apple computers, the inbuilt backup program, TimeMachine, can be used to back up the system to a disk. Microsoft Windows computers can utilise backup functionality included with Windows.
Commercial backup programs for Windows systems provide different functionality and flexibility.
For more information about backing up a, see:
Windows: https://www.cyber.gov.au/acsc/view-all-content/guidance/back-and-restore-microsoft-windows
Apple: https://www.cyber.gov.au/acsc/view-all-content/guidance/back-and-restore-apple-macos
Comments
0 comments
Please sign in to leave a comment.