{"id":887,"date":"2019-11-24T10:21:39","date_gmt":"2019-11-24T10:21:39","guid":{"rendered":"http:\/\/www.bristol-computer-support.co.uk\/bristolcomputersupportblog\/?p=887"},"modified":"2019-11-24T10:29:25","modified_gmt":"2019-11-24T10:29:25","slug":"some-general-security-information","status":"publish","type":"post","link":"https:\/\/www.bristol-computer-support.co.uk\/bristolcomputersupportblog\/?p=887","title":{"rendered":"Some General Security Information"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-890\" src=\"https:\/\/www.bristol-computer-support.co.uk\/bristolcomputersupportblog\/wp-content\/uploads\/cyber-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.bristol-computer-support.co.uk\/bristolcomputersupportblog\/wp-content\/uploads\/cyber-300x200.jpg 300w, https:\/\/www.bristol-computer-support.co.uk\/bristolcomputersupportblog\/wp-content\/uploads\/cyber-768x513.jpg 768w, https:\/\/www.bristol-computer-support.co.uk\/bristolcomputersupportblog\/wp-content\/uploads\/cyber.jpg 960w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><strong>Activate Two-Factor Authentication<\/strong><br \/>\nAdding two-factor authentication to your email, file storage, and social media<br \/>\naccounts is the most important step you can take to secure your information and<br \/>\nit\u2019s really simple to set up. Your campaign will tell you which two-factor method to<br \/>\nuse. Two-factor authentication makes it a lot harder for the bad guys to get into your<br \/>\naccount, even if they steal your password.<\/p>\n<p><strong>Create Strong Passwords<\/strong><br \/>\nMake your password as long as possible. Think of it more as a \u201cpass-sentence\u201d than a<br \/>\npassword. Less than 8 characters is too short. 12 or longer is much better. Contrary to popular belief, it should not include requirements for numbers, special characters, or capitalization. SOMETHINGLIKETHISPASSWORDHERE is actually harder to hack than s0m3TH!n6L1k$. String a set of words together that are easy for you to remember. Don\u2019t write your password down where someone can find it. If you have even a faint suspicion that someone might know your password, change it immediately.<\/p>\n<p><strong>Keep work on your work accounts<\/strong><br \/>\nNever use your personal email or storage services for campaign work. Foreign agents have hacked people\u2019s personal email accounts in the past to steal information. To keep your personal life secure, use strong passwords and two-factor authentication.<\/p>\n<p><strong>Secure your personal accounts<\/strong><br \/>\nMake sure you have two-factor and strong passwords on your personal accounts, just in case someone tries to hack your personal life. If you are on Gmail, there\u2019s a service for personal accounts called Advanced Protection that uses physical keys to give you extra protection from someone else logging onto your accounts. There is also a Chrome extension you can download that helps protect Gmail accounts against phishing.<\/p>\n<p><strong>Watch out\u2026<\/strong><br \/>\nClicking links. Avoid clicking links in emails; go directly to a site through your browser instead. Just clicking a malicious link can install malware on your computer. Be especially careful of links that ask for your password or personal information. If you see something suspicious, contact us immediately!<\/p>\n<p><strong>Trust your gut.<\/strong><br \/>\nIf an email looks funny or has strange grammar, don\u2019t click anything or open any attachments. If a co-worker seems to be sending a strange request, or asking you to share something sensitive over email, pick up the phone and call them to make sure it\u2019s legit. Never click links, open attachments, or send sensitive information in response to emails from people you don\u2019t know or addresses you don\u2019t recognize. If you see something suspicious or aren\u2019t sure what to do, just say so!<\/p>\n<p><strong>Downloading apps.<\/strong><br \/>\nOnly download apps from the official Apple or Android store on your device. Avoid downloading apps you don\u2019t need, since adversaries will sometimes spy on your computer or phone by creating apps disguised as games or helpful tools.<\/p>\n<p><strong>Social media.<\/strong><br \/>\nYour social media accounts contain a wealth of information about you and your whereabouts that hackers can use to send you sophisticated phishing emails. Limit the information you share by default and select security settings that allow only accepted friends to see personal information. Don\u2019t accept friend requests from people you don\u2019t know.<\/p>\n<p><strong>Matt Clark<\/strong><br \/>\n<strong>07966 497090<\/strong><br \/>\n<strong>matthew.clark@bristol-computer-support.co.uk<\/strong><\/p>\n<div class=\"tweetthis\" style=\"text-align:left;\"><p> <a target=\"_blank\" rel=\"nofollow\" class=\"tt\" href=\"http:\/\/twitter.com\/home\/?status=Some+General+Security+Information+http%3A%2F%2Fbristol-computer-support.co.uk%2Fbristolcomputersupportblog%2F%3Fp%3D887\" title=\"Post to Twitter\"><img decoding=\"async\" class=\"nothumb\" src=\"https:\/\/www.bristol-computer-support.co.uk\/bristolcomputersupportblog\/wp-content\/plugins\/tweet-this\/icons\/en\/twitter\/tt-twitter.png\" alt=\"Post to Twitter\" \/><\/a> <a target=\"_blank\" rel=\"nofollow\" class=\"tt\" href=\"http:\/\/twitter.com\/home\/?status=Some+General+Security+Information+http%3A%2F%2Fbristol-computer-support.co.uk%2Fbristolcomputersupportblog%2F%3Fp%3D887\" title=\"Post to Twitter\">Tweet This Post<\/a><\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>Activate Two-Factor Authentication Adding two-factor authentication to your email, file storage, and social media accounts is the most important step you can take to secure your information and it\u2019s really simple to set up. Your campaign will tell you which &hellip; <a href=\"https:\/\/www.bristol-computer-support.co.uk\/bristolcomputersupportblog\/?p=887\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-887","post","type-post","status-publish","format-standard","hentry","category-pc-support"],"_links":{"self":[{"href":"https:\/\/www.bristol-computer-support.co.uk\/bristolcomputersupportblog\/index.php?rest_route=\/wp\/v2\/posts\/887","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bristol-computer-support.co.uk\/bristolcomputersupportblog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bristol-computer-support.co.uk\/bristolcomputersupportblog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bristol-computer-support.co.uk\/bristolcomputersupportblog\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bristol-computer-support.co.uk\/bristolcomputersupportblog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=887"}],"version-history":[{"count":5,"href":"https:\/\/www.bristol-computer-support.co.uk\/bristolcomputersupportblog\/index.php?rest_route=\/wp\/v2\/posts\/887\/revisions"}],"predecessor-version":[{"id":893,"href":"https:\/\/www.bristol-computer-support.co.uk\/bristolcomputersupportblog\/index.php?rest_route=\/wp\/v2\/posts\/887\/revisions\/893"}],"wp:attachment":[{"href":"https:\/\/www.bristol-computer-support.co.uk\/bristolcomputersupportblog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=887"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bristol-computer-support.co.uk\/bristolcomputersupportblog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=887"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bristol-computer-support.co.uk\/bristolcomputersupportblog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}