Yellowstone Computing
(715)-669-6136
  • Home
  • Services
  • Support
  • Contact
  • Blog
  • About
  • Reviews
  • Repairs

10 Internet Security Tips to Make 2019 Your Most Cyber Secure Year Ever, Part 1

1/24/2019

 
Picture
A guest post, courtesy of Emsisoft. We’ll cover the remaining 6 security tips in next week’s column, so stay tuned! If you have any questions about the topics discussed here or need help implementing them, call, click, or visit us today!

The new year is here, and now is the perfect time to wipe the slate clean and start 2019 off on the right foot. While many people’s New Year’s resolutions will be centered around eating healthier and exercising more, here at Emsisoft we’re more concerned about your digital wellbeing. 
 
Cybersecurity promises to remain an important topic in the year ahead as more internet-connected devices enter the home, attackers increasingly leverage the power of AI and consumers come to rely even more on cloud-based services. But all is not lost! Regardless of what 2019 brings, good basic cyber hygiene is still the best defense for protecting yourself against modern digital threats. We’ve rounded up 10 simple Internet security tips to make 2019 your most cyber secure year ever.  

1) Make backups 
A good backup strategy offers the ultimate peace of mind. In the event of data loss – due to, say, ransomware or hardware failure – you can simply restore your system to its original safe state.  
The 3-2-1 backup strategy is a great starting point for most home users and SMBs. It involves: 
• Keeping 3 copies of your data. 
• Storing 2 of these copies locally on different devices (e.g. external hard drives) 
• Storing 1 copy offsite (e.g. using a cloud-based backup service). Maintaining an offsite copy is critical for ensuring your backup is safe even in the event of theft or a natural disaster. 
Implementing a good backup strategy does require a bit of planning (and probably a small amount of money) but the investment is absolutely worth it. Sleep easy in 2019 knowing that your files will be safe from harm even if your system falls.  

2) Invest in reliable antivirus software 
Hundreds of thousands of malware samples are produced every single day – a trend that’s unlikely to stop any time soon. The most effective way to protect your system against worms, trojans, ransomware, potentially unwanted programs (PUPs) and other malicious software is to invest in a reliable antivirus solution. There are a number of worthy contenders on the market. When it comes to choosing antivirus software, it’s important to remember that detection rates are just one piece of the puzzle. For example, factors such as system impact, usability, support and the company’s privacy policy may all influence your decision. If you’re looking for a proven antivirus solution that won’t slow your system down, feel free to download a free 30-day trial of Emsisoft Anti-Malware.  

3) Splash out on a VPN subscription
If you’re a frequent traveler, regularly on the road for work or generally concerned about your privacy, you might want to think about getting a subscription for a VPN service. What does a VPN actually do? Well, when you browse the Internet, there’s a transfer of information taking place back and forth between your computer and the websites you access. However, this information can potentially be intercepted, allowing attackers to steal sensitive information such as your passwords, emails and login credentials.  
A VPN creates a secure, encrypted connection between your computer and any websites your visit. This makes it much more difficult to identify your system as a source of data, and it also means that any information that is intercepted is encrypted and more or less useless to the bad guys.  

4) Enable 2FA wherever possible
Two-factor authentication (or 2FA for short) adds an extra layer of security that is used to ensure that people trying to log in to a website or service are really who they say they are.  
Enabling 2FA means that, in addition to entering your username and password when accessing an account, you’ll also need to provide another piece of information that proves your identity. For example, many banks will issue tokens that generate a one-time use password or send you a verification code to your mobile phone.  

Most banks, email providers, online stores and other major service providers will offer an option for 2FA, so be sure to enable it wherever possible. It only takes a few extra seconds to log in using 2FA, but it can single-handedly thwart cybercriminals from getting access to your personal accounts (although it should be noted that 2FA is not a perfect solution).  

​

Comments are closed.

    Yellowstone Computing

    To read about us, click here!

    Archives

    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    November 2016
    October 2016
    December 2015
    September 2015
    July 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014

    Categories

    All

    RSS Feed

Visit Us!

What Our Clients Are Saying

Joe is really in tune with what our business needs are... what a great guy with amazing skills... - Grassland Veterinary Service

Yellowstone Computing goes above and beyond for their customers! Joe is very knowledgeable and will go the extra mile to make sure his customers not only get what they asked for but also makes sure they are taken care of for many years to come! Between the great business services they provide and their involvement in the Thorp Chamber I'd highly recommend doing business with Yellowstone Computing! Whether you are an individual looking for computer or other technology help or a large employer who needs to either supplement your current IT support or completely outsource it Yellowstone Computing should be one of your first calls! - Justin Z.