4.21.2017

National Cyber ​​Security Alliance provides tips for success & # 39; Digital Cleaning & # 39 Spring;

(NER) - According to a recent report by Javelin Strategy & Research, 15.4 million consumers were victims of identity theft or fraud last year, the highest number recorded since the company began in 2004 scam.

In this context, the Better Business Bureau and the National Cyber ​​Security Alliance Consumers want to take their annual ritual of spring cleaning in the digital age by offering a list of useful tips and the ability to destroy confidential documents.

"Just as drive safely shredding paper documents, accreditation will also call for consumers and businesses that electronic files to ensure properly deleted when it is needed," said Bill Fanelli, director of information, the Council of Better Business Bureau. "Old hard drives, data keys, mobile phones, tablets must be destroyed safely some sensitive data. Cleaning digital spring means to delete old files to update passwords and take other measures to ensure that your personal information remains confidential. "

NCSA digital spring cleaning ritual coincides with Secure your day Identification accreditation. Chattanooga, two days crushing and electronic recycling be paid on site. Participants can bring up to three bags or boxes of sensitive information from documents and up to two hard drives and PC for free on site shredding.

Just as important as physical grinding your life online refreshing, said the nonprofit organization NCSA.

"It is likely that over the years a lot of fingerprint has accumulated that can affect your level of cyber security. It is important to remember that the destruction of sensitive paper before throwing them away, you have to really important electronic data destroy, "said Michael Kaiser, CEO.

The agency has identified these tips easy to follow.

DIGITAL spring cleaning

  1. Keep a clean machine. Make sure that all the software on the Internet connected devices - will be updated in order to reduce the risk of malware infection - including PCs, smartphones and tablets.
  2. Block your connection. Their names and passwords are not enough to protect key accounts, such as email, banking and social media. Fortify your online accounts and more tools such as biometric authentication, security key or a single unique code via an application on the mobile device.
  3. Unclutter your mobile life. Remove unused applications and other updates, including the operating system of your mobile device. An additional advantage of elimination is used by applications, is not more storage space and the service life of the battery. actively manage location services, Bluetooth, microphone and camera - to secure applications to use them properly.
  4. Take a digital file purging. Perform online a good thorough review of their files. They tend to your digital documents, computers, telephones, and any storage device as if it were paper files.

PURGE DIGITAL ARCHIVE

Start following with your digital file purging.

  1. Clean your e - mail. Save only the messages that you really need to send the low need / want to get.
  2. Revert. Copy important data in a safe place in the cloud or on another computer or drive where you can securely store. Password protect backup disks. Be sure to back up your files before you to a device.
  3. Own your online - presence. Comment on the protection of privacy and security settings on websites that you can use to ensure that they stay connected to their comfort to share. It must be limited in order, how and with whom the information is shared

ABOLITION OF DATA

Follow these simple tips to use to help the safe disposal of electronically stored data.

Knowing "shred." What devices digital computers and mobile phones are not the only devices that capture and store sensitive personal data. External hard drives and USB drives, tape drives, flash memory, wearables, network equipment and office tools, such as copiers, printers and fax machines all contain valuable personal data.

clear inventory. If you have a stock of old hard drives or other devices - even if they are in a locked storage area - stay information may be stolen. Do not wait destroy for cleaning and / or unnecessary units.

Trash emptied or trash on every device and its safe to clean and destroy them. Remove and just did not empty the garbage is enough to completely get rid of a file. You must delete old files permanently. Use a program that deletes data "clean" your device and destroy putting random data instead of information - which can not be recovered.

Deciding what to do with the device. Once the device is clean, you can sell it, trade them, give them away, recycle or destroy.

But note the following:

failed drives still contain data. In case of defective discs often fails cleaning, too; Pinch / destruction is the practical approach to removing failed drives. Avoid these discs back to the manufacturer; You can buy support that can keep you - and then destroy it.

"Shredded" to a hard disk must be cut off into small pieces. Using a hammer, a player hits a determined cyber criminals to slow down; Instead, use a shredder companies get rid of confidence to get your old hard drives. Breaking device can often have economic option, the fastest and most effective many readers.

© 2017 Chattanooga sold Times / Free Press (Chattanooga, Tenn.) From Tribune Content Agency, LLC.

Let you us block the ads! (Why?)

Aucun commentaire:

Enregistrer un commentaire