Good IT security resolutions for 2018
The new year is just a few days old, and yet cybercriminals have already launched thousands of new malware programs to steal personal data or extort money. The smart thing to do is to take a close look at your IT security.
G Data Software AG therefore advises Internet users to carefully check their own IT security now and make any necessary improvements:
Deploy security solution
A powerful security software is part of the basic equipment of every PC and mobile device. It should effectively protect against malware and other online threats and be regularly updated. If the license has expired, it should be extended or renewed again immediately.
Apply all updates
For the operating system, and all installed applications on the PC and mobile device, the available updates should be installed. Outdated programs that manufacturers no longer update should be deleted and possibly replaced with new software.
Delete online user accounts that are no longer needed
Whether payment service providers, social networks, online stores or e-mail providers - Internet users have numerous user accounts on the net. To minimize the risk of data theft, it's worth cleaning out your accounts from time to time and deleting those that are no longer needed.
Change passwords
Users should change the passwords for online user accounts at stores or social networks at regular intervals and use a unique password for each portal. A secure password consists of a random sequence of numbers and letters in upper and lower case. A password manager can help you manage your passwords.
Back up important data
A backup saves all data. A system image can also be used to back up the hard disk with all installed programs. Powerful security solutions include a backup module, so the purchase of additional software is no longer necessary.
Apps only from secure sources
Apps should only be obtained from trustworthy sources, for example Google Play for Android, Apple's App Store or from providers and device manufacturers. In particular, the requested permissions of the apps should be checked critically.
Here go to the cybercrime trends 2018