Security Tip (ST04-003)
Good Security Habits
There are some simple habits you can adopt that, if performed consistently, may dramatically reduce the chances that the information on your computer will be lost or corrupted.
How can I minimize the access others have to my information?
It may be easy to identify people who could gain physical access to your devices—family members, roommates, coworkers, people nearby, and others. However, identifying the people who have the capability to gain remote access to your devices is not as simple—as long as your device is connected to the Internet, you are at risk for someone accessing your information; however, you can significantly reduce your risk by developing habits that make it more difficult.
- Improve password security. Passwords continue to be one of the most vulnerable cyber defenses.
- Create a strong password. Use a strong password that is unique for each device or account. Longer passwords are more secure. An option to help you create a long password is using a passphrase—four or more random words grouped together and used as a password. To create strong passwords, the National Institute of Standards and Technology (NIST) suggests using simple, long, and memorable passwords or passphrases.
- Consider using a password manager. Password manager applications manage different accounts and passwords while having added benefits, including identifying weak or repeated passwords. There are many different options, so start by looking for an application that has a large install base (e.g., 1 million plus) and an overall positive review. Properly using one of these password managers may help improve your overall password security.
- Use two-factor authentication if available. Two-factor authentication is a more secure method of authorizing access. It requires two out of the following three types of credentials: something you know (like a password or PIN), something you have (like a token or ID card), and something you are (like a biometric fingerprint). Because one of the two required credentials requires physical presence, this step creates a much more challenging scenario for a threat actor trying to compromise your device.
- Use security questions properly. For accounts that ask you to set up one or a series of password reset questions, use private information about yourself that only you would know. Answers that can be found on your social media or facts everyone knows about you can make it easier for someone to guess your password.
- Create unique accounts for each user per device. Set up individual accounts that only have access and permissions needed by each user. Only temporarily elevate daily use accounts to have administrative permissions when required. This configuration reduces the impact of poor choices such as clicking on bad emails or visiting malicious websites.
- Choose secure networks. Use Internet connections you trust, such as your home service or your LTE connection through your wireless carrier. Public networks are not very secure, which makes it easy for others to intercept your data. If you choose to connect to open networks, consider using antivirus and firewall software on your device. Another way you can help secure your mobile data is by using a Virtual Private Network service, which allows you to connect to the Internet securely by keeping your exchanges private while you use Wi-Fi. When setting up your home wireless network, use WPA2 encryption. All other wireless encryption methods are outdated and more vulnerable to exploitation. In early 2018, the Wi-Fi Alliance announced WPA3 as a replacement to the longstanding WPA2 wireless encryption standard. As WPA3-certified devices become available, users should employ the new standard. (See Securing Wireless Networks.)
- Keep all of your personal electronic device software current. Manufacturers issue updates as they discover vulnerabilities in their products. Automatic updates make this easier for many devices–this includes computers, phones, tablets, and other smart devices—but you may need to do it manually for other devices. Only apply updates from manufacture websites and built-in application stores—third-party sites and applications are unreliable and can result in an infected device. When shopping for new connected devices, consider the brand’s consistency in providing regular support updates.
- Be suspicious of unexpected emails. Phishing emails are currently one of the most prevalent risks to the average user. The goal of a phishing email is to gain information about you, steal money from you, or to install malicious information on your device. Be suspicious of all unexpected emails. For more information, read Avoiding Social Engineering and Phishing Attacks.