I’ve been working within the IT trade for over 30 years, for many of this time as an editor at PC-WELT (PCWorld’s German sister publication), specializing in safety. I check antivirus software program, give recommendations on how you can make Windows safer, am continually looking out for the perfect safety instruments, and monitor the actions of cyber criminals.
Over the years, I’ve acquired a complete vary of behaviors and rules that appear utterly regular and smart to me. However, once I observe different PC customers, I typically uncover dangerous or at the least much less security-oriented habits.
That’s why I’ve put collectively the 10 most vital issues I might by no means do as an IT safety professional, with recommendations on what to do as a substitute.
Further studying: Best antivirus software
1. Move as a substitute of copy
IDG
Moving your individual recordsdata as a substitute of copying them instantly makes me really feel uneasy. This consists of, for instance, pictures or movies from the digital camera or audio recordings from a smartphone or audio recorder. If you progress such recordsdata, that are often distinctive, you run the chance of dropping them as quickly as you progress them. Although that is very uncommon, it can’t be utterly dominated out.
But even when the shifting course of goes easily: The information is then nonetheless solely accessible as soon as. If the onerous drive within the PC breaks, the info is gone. If I make a mistake and by chance delete the recordsdata, they’re gone. These are dangers that solely come up if you happen to begin a transfer operation as a substitute of a duplicate operation.
If you suppose “I need the space on the SD card for new photos,” then you must contemplate shopping for a second SD card. Your personal information is all the time price it.
And when do I launch the area on the SD card? I do that as quickly as my backup plan on the PC has backed up the copied information. In my case, that is completed on a tough drive within the community that runs on a Raspberry Pi.
Important recordsdata are additionally routinely encrypted and uploaded to cloud storage.
Further studying: Best online backup services
2. Save my very own information with out a backup
I’ve arrange an automatic backup for all important data. Because saving recordsdata I’ve created myself with out a immediate backup is much too dangerous for me. This additionally consists of all information that I enter into apps, for instance, whether or not for Android, iOS, or Windows. Just as a result of most apps don’t supply an simply recognizable backup operate doesn’t absolve the person of accountability for his or her information.
For instance, at two grammar faculties in Koblenz, Germany, a number of hundred college iPads had been logged off the varsity community as a consequence of an error. The handwritten notes within the Goodnotes app utilized by the pupils had been deleted. Many college students had labored completely with the varsity’s personal iPads and this app — in different phrases, there was no secondary copy of their notes. Around 500 of the whole of 7,500 iPads had been affected by the info loss by being linked to the varsity community on the time of the breakdown.
A cloud backup, as is common for iPads, was deactivated for information safety causes. No different type of information backup seems to have been used. The pupils involved can’t be blamed right here, however the system administrator accountable can.
3. Format storage with out a thorough test
IDG
I might by no means make this error — as a result of I’ve made it earlier than. Therefore, I can solely advise from expertise: Only format a storage drive when you find yourself positive that you’ve got chosen the proper drive.
For years, I used exterior USB onerous drives to retailer my recordsdata. The folder construction on these onerous drives was often an identical. There had been the folders “My Documents,” “Videos,” “Temp,” “Virtual PCs,” and some extra. What’s extra, all of the onerous drives had been the identical mannequin, which I had as soon as purchased generously on a great deal. Some of those disks even had the identical information provider designation — particularly “Data.”
That wasn’t very intelligent, as a result of it made it too simple to combine them up. So I ended up complicated certainly one of these onerous drives with one other one at a late hour and formatted the incorrect one.
Since then, I’ve named and labelled my exterior onerous drives and USB sticks very clearly and take one other shut look earlier than formatting them.
First test, then format: Choosing the proper drive earlier than formatting is essential to keep away from unintentional information loss. In Windows Explorer, test which drive letter the onerous drive or partition to be formatted has. This is usually not instantly obvious on programs with a number of drives. Take the time to test, unplug different onerous disks and drives to extend the overview. The title of the disk and its dimension will allow you to to determine it.
In addition, begin Disk Management by coming into Disk Management within the Windows search. All linked disks and their partitions will likely be displayed. Only begin formatting when you find yourself positive that you’ve got discovered the proper onerous drive, USB stick, or partition.
4. Open hyperlinks in emails
I don’t wish to open a hyperlink in an e mail. And I by no means open a hyperlink if the e-mail is supposedly from my financial institution or cost service supplier. I don’t even open the hyperlink within the month-to-month e mail from PayPal, although I do know that this e mail really comes from PayPal.
Why not? Nowadays it is vitally simple for an attacker to create a deceptively actual copy of a financial institution e mail. I wouldn’t reliably acknowledge the distinction between a phishing e mail and an actual financial institution e mail — at the least not within the brief time I’ve to test my inbox.
Instead, I open on-line banking pages and different vital pages through hyperlinks I’ve saved in my browser, or retype the deal with into the browser every time. I log in to the positioning and test whether or not a brand new message has arrived in my buyer account. If not, then the message within the e mail is both a pretend or not vital sufficient for the financial institution to enter this info in my buyer account. That’s the top of the matter for me.
Tip: Change these 5 Windows settings to improve your data privacy
5. Opening suspicious recordsdata
IDG
If a file is suspicious, no matter whether or not it’s a program or a doc, I don’t open it. The danger is just too nice. As an IT editor, I’m after all continually downloading instruments from the web and fairly a couple of of them are scanned by the virus scanner. That is one indication that makes a file suspicious.
Another is the supply. Files from doubtful web sites are simply as suspicious as recordsdata which might be hooked up to an e mail or come from hyperlinks in emails. If I can’t keep away from opening or beginning such recordsdata, I all the time test them first with the instrument www.virustotal.com. The on-line service checks a file with greater than 60 virus scanners.
If you need much more details about a suspicious file than www.virustotal.com gives, you too can add suspicious recordsdata to an internet sandbox. However, that is considerably extra sophisticated than a check at Virustotal. The providers typically require registration and are generally topic to a payment.
A free and uncomplicated on-line sandbox with out registration is out there at www.hybrid-analysis.com.
6. Give vouchers for cost of providers
Foundry
Who would need to do that? An astonishing variety of customers! They are all victims of a social engineering assault. Social engineering makes use of psychological methods to control folks into doing issues that aren’t of their pursuits. Human traits similar to belief, worry, or ignorance are exploited.
A well-liked trick goes like this: You are browsing the web and all of the sudden a warning message seems that seems to come back from Windows. Your PC has been hacked and you must name a help phone quantity so {that a} Microsoft worker can repair your PC. When you name, you might be advised that your PC has really been hacked. However, this prices cash and is meant to be paid for with voucher playing cards. The criminals demand these as a result of voucher codes are a lot more durable for the police to hint than a financial institution switch.
The truth is: Nobody is resistant to the methods of social engineering. A well-prepared and skillful attacker can lure anybody right into a entice. There are many examples of this — search “CEO fraud.” But the second one thing as uncommon as a voucher code for a service is requested, you possibly can grow to be suspicious and escape the entice. The identical applies in case you are advised that somebody is coming spherical to gather cash from you.
See additionally: How do I remove malware from my PC?
7. Connect unknown exterior gadgets
A USB stick whose proprietor I don’t know. I’m not plugging it in. Fortunately, gone are the times when Windows’ autostart operate instantly launched an EXE file from a linked USB stick. By default, Windows 10 and 11 solely supply to start out Windows Explorer to show the contents of the USB stick.
So that’s not the issue. But like everybody, I’m curious. Attackers benefit from this and save malicious recordsdata with file names which you can’t resist opening.
For a very long time, safety consultants stated that if you happen to wished to interrupt into an organization community, all you needed to do was depart a couple of contaminated USB sticks within the firm car parking zone. Some worker will seize a stick and join it to their work PC.
The skilled malware Stuxnet can be stated to have reached the computer systems on the Iranian nuclear facility through a USB stick. It is simply unclear whether or not this USB stick acquired into the plant through the car parking zone trick or whether or not an insider smuggled it in. Stuxnet destroyed the centrifuges within the nuclear facility and thus delayed the manufacturing of fissile materials for a nuclear bomb.
When you need to insert a international USB stick: The identical guidelines apply as below level 5. Check the recordsdata on www.virustotal.com or begin them in a sandbox.
8. Use default passwords
When I join a brand new system that has default password safety, I instantly change the present password. The identical applies to on-line accounts which have given me a password.
Admittedly: It has grow to be uncommon for a router to come back with a default password. However, it’s all the extra vital to behave shortly within the remaining instances. This is as a result of attackers know the default passwords and attempt to use them to log into the gadgets. A great password manager might help you create robust, distinctive passwords for each website and repair you utilize.
9. Enable pointless community providers
IDG
Hardly a month goes by with out a new safety vulnerability in a NAS or webcam turning into recognized. These community gadgets are often weak through the web and permit hackers to entry the info on the NAS, the photographs on the webcam, and even the complete residence community.
That’s why I don’t activate any community providers that I don’t want. Remote entry to my router — deactivated. Remote entry to my sensible lighting — deactivated. Access to my NAS and the robotic vacuum cleaner can be deactivated.
10. Buy an costly Plus model of antivirus
PCWorld
Antivirus software program is often accessible in three variations. Simple, good, and excellent — or antivirus, web safety, and whole safety. I might by no means purchase the third and most costly model.
That’s purely a monetary consideration: If I had been wealthy, I might resolve otherwise. But so long as cash is tight, I solely purchase the center variant, which is often known as Internet Security. It often gives greater than the free Microsoft Defender, however will not be as costly as the total model.
With the latter, I might be paying for providers that I don’t essentially want (metadata cleaning, social media monitoring) or that I can get cheaper elsewhere (VPN services, cloud storage).
As I stated, the whole variations supply extra, however I don’t want that additional.
This article was translated from German to English and initially appeared on pcwelt.de.