In today’s digital age, end user security is more critical than ever. This security decalogue provides practical and effective tips to protect your information:
By distributing your emails into these 3 accounts, you can better control the emails you receive, contain spam or junk mail, and raise alarms if an out-of-place email arrives. You will also have the security that if the Public Email is compromised, your personal data will not be reached.
⚠️ Be careful who is watching your screen because you may have chats open with confidential information or your online banking, and there are always ill-intentioned people who can stand behind us and easily obtain this personal, private information that belongs to you or the organization. Be cautious, as this is a very commonly used social engineering attack.
If you handle a company phone with confidential information, we advise you to avoid connecting to open or public networks, such as those in cafes or restaurants, as you could be a victim of a Man-In-The-Middle attack. In such an attack, people infiltrate and exploit network insecurity to access and obtain confidential information that they are not authorized to have. If you must do this, use a tool known as VPN to ensure the information travels securely and to protect end user security.
On the Internet, make sure you see the S
after the http
in the search bar (https:
). This indicates that the information is being encrypted to the server. If, while browsing, you encounter a notice like this
That makes you feel special, ignore this type of advertisement, as it is misleading and could harm your computer by downloading such viruses. In some cases, these pop-ups are not necessarily malware or viruses that will install on our computers; they are often apps that Google shows us and may be harmless or interesting to you. It is important to check where the link to that pop-up is located.
Another type of pop-up is the one that notifies you that they will capture cookies. Some companies have large screens displaying information, and it is important that they do not have metrics or confidential organization information, as visitors who do not belong to the organization may obtain access to those data without authorization.
To access your equipment, whether it is your email, Instagram, Facebook, etc., make sure to have a password manager, either one you have or one offered by Google Chrome. Never leave the password written on a post-it where everyone can see it, and never send the password via text messages. Do not store your password in a notepad on your computer, as it can be easily found. Most importantly, do not use the same password for everything.
This group focuses primarily on handling information security incidents that occur on assets supported by the entity's technological platform.
This stage within the incident response lifecycle is typically done with the goal of not only creating a model that enables the entity to respond to these incidents but also in a way that they can be detected, evaluated, and manage vulnerabilities to prevent them, ensuring that systems, networks, and applications are secure enough. Although the incident response team is not normally responsible for incident prevention, it is essential to consider it a fundamental component of response programs. The incident response team should act as an expert tool in establishing recommendations for securing information systems and the platform that supports them.
In this stage, the incident management group or whoever is designated for this task must ensure the availability of incident response resources and the necessary tools to cover the other stages of the incident lifecycle, creating (if they do not exist) and validating (if they do exist) the necessary procedures and training programs.
The preparation stage should be supported by the IT direction or its equivalent, including best practices for securing networks, systems, and applications, for example:
· Security Patch Management: Entities, depending on their stratification, should have a vulnerability management program (Operating Systems, Databases, Applications, Other Installed Software). This program will help administrators identify, acquire, test, and install patches.
· Platform Assurance: Entities, depending on their stratification, should be properly secured. The least amount of services (principle of least privilege) should be configured to provide only those services necessary to both end users and other devices. Default configurations (users, passwords, and shared files) should be reviewed. Every resource that can be accessed by external or even internal end users should display some warning. Servers should have their auditing systems enabled to allow event logging.
· Network Security: Continuous management of security elements is necessary. Security rules configured on devices such as firewalls should be continually reviewed. The signatures and updates of devices like IDS or IPS should be up to date. All security and network elements should be synchronized, and their logs should be sent to a centralized log collection device for analysis.
· Malicious Code Prevention: All infrastructure devices (both servers and end user devices) should have active antivirus, antimalware with up-to-date signatures.
· User Awareness and Training: Users within the entity, including IT administrators, should be made aware of existing policies and procedures related to the proper use of networks, systems, and applications in line with the entity's security standards. Information system managers should establish training needs for those responsible for data protection.
The activities described above aim to prevent information security incidents supported by IT. Additionally, a monthly evaluation is necessary.