(MENAFN-10 Communications) On the occasion of the 33rd anniversary of Computer Security Day, Check PointÂ® Software Technologies Ltd. (NASDAQ: CHKP), one of the world’s leading providers of cybersecurity solutions, provides five important reminders to protect computer systems at home and in the office.
Since the launch of Computer Security Day in 1988, the level of cyber threats has increased every year and the past 12 months have seen the highest level of cyber incidents on record. New and more sophisticated threats, more devices, more computing power and professional criminal gangs mean that anyone with a computer, smartphone or IoT device now has to regularly think about cybersecurity, but many still don’t. not. Especially in today’s world with the increase of remote working, each of us carries a certain level of responsibility when it comes to security. For this reason, the following tips have been compiled to provide guidance and assistance in protecting both our personal devices and the company’s computer systems:
– Passwords are important: passwords should be checked and strengthened regularly. However, experts discuss the duration and composition as well as the frequency of renewal. It is important that users manage their passwords carefully, do not store them insecurely in Excel spreadsheets or leave them written down for anyone to see or paste on the back of the keyboard. “1234” or “password” are not secure passwords.
– Protect yourself against phishing: Users should be careful before clicking on links that appear suspicious in any way, often associated with the sender. They should also only download content from trusted sources, as phishing, a popular form of social engineering, has become the main route of attack. Therefore, if users receive an email with an unusual request or a strange sender or subject, they should immediately start to doubt.
– Choosing the right computer devices: In connection with teleworking, this point has become extremely important. The risk of a large-scale attack increases when employees use their personal devices, such as computers or cell phones, for business purposes. Security software should be installed on all devices and the connection to the corporate network should be protected.
– Keep software up to date: Hackers often find entry points into applications, operating systems and security solutions, as they typically monitor and exploit for vulnerabilities. One of the best safeguards is to always use the latest version of any software – simple, basic, but effective.
– Use multi-factor authentication: Multi-factor authentication is something that many users are already familiar with from their online bank accounts, for example when a TAN (one-time access code) is requested via a mobile phone. In many cases, this login method is now being introduced for online retailer apps and accounts to increase IT security. In this way, they have made it almost impossible for cyber criminals to gain access to the system despite knowing the password.
These tips already go a long way in protecting your own devices and your business against cyber attacks and malware. However, it must also be complemented by a comprehensive IT security architecture that centrally consolidates and controls various security solutions against different types of attacks. It covers all areas of computer security and can even intercept dreaded zero-day attacks. Finally, complete the strategy by training all employees up to management level, including the training of specialists through specific training programs and learning platforms.
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (is a leading provider of cybersecurity solutions to businesses and governments around the world. Check Point Infinity portfolio solutions protect customers against 5th generation cyberattacks with capture rates of malware, ransomware and other industry-leading threats. Infinity is built on three fundamental pillars that provide uncompromising security and defense against Generation V threats in enterprise environments: Check Point Harmony for remote users; Check Point CloudGuard for automated cloud protection Check Point Quantum for network perimeter and data center protection – all powered by the most comprehensive and most comprehensive solutions Intuitive, unified security management Check Point protects over 100,000 businesses across sizes in the world.
Legal warning: MENAFN provides the information “as is” without warranty of any kind. We do not accept any responsibility for the accuracy, content, images, videos, licenses, completeness, legality or reliability of the information contained in this article. If you have any complaints or copyright issues related to this item, please contact the supplier above.