- The operating system must be updated (regardless of whether vb of Windows, Linux, MacOS)
- Antivirus is recommended (Windows Defender is very easy to use and updates automatically, Bitdefender, Avira or other enterprise solutions can be used)
- Separate personal data from business data (on external HDD, in the Cloud or on company servers)
- The use of VPN services can secure the connection to the company’s resources or to the services used (anonymizes the traffic generated on the Internet)
- The password (the password used to be as long and complex as possible – letters, numbers, special characters – and to be, if possible, unique for each account) of the devices that have access to the Internet is necessary, because the equipment hardware (switches, routers) can be attacked, not only applications
- Critical data encryption is an additional layer of protection, along with the use of access hardware tokens
- The use of plug-ins that prevent cryptocurrency miners from running in the browser
- Anonymizing workstation traffic by using the anonymous search engine (for example: duckduckgo)
- The Zoom Meeting application can be replaced with Hangouts / Microsoft Team / Skype, each of which has its drawbacks
- The Team Viewer application has security risks, but can be used in case of need and later uninstalled
- Using the Guest account instead of the Admin account, to limit the execution permissions of a malicious application
- The connection to the professional email account should be made only through a secure connection (VPN), not directly from the device used for personal purposes.
We are part of the great global bubble called the Internet and if we do not protect ourselves, no one will do it for us. We are here to offer you specialized consultancy in the field of information security and software solutions.