At River Run, our mission is to help our people, our clients, and our community achieve meaningful results. One way we honor this mission is sharing some Cyber Security best practices to protect all of the above. This checklist will help you adopt some new or recurring tasks to keep you safe and minimize your Cyber Exposure. Be Cybersafe!
Personal Cyber Security
Cell Phone Protection
- Password protect Cell Phones
- Set up Multifactor Authentication (MFA) – use Fingerprint/Facial recognition along with PIN or passcode
- Enable Data Encryption to protect your data in transit to/from sources
- Set up Remote Wipe Capabilities – if your device is lost/stolen, you will be able to remove personal data
- Use trusted phone charging stations – be wary of public phone charging stations
- Be wary of applications requesting access to your camera, microphone, etc.
- Keep phone’s operating system patched and updated
- Never leave device unattended or unlocked
- Power Cycle/Restart your phone weekly
- Change home WiFi passwords every 6 to 12 months at a minimum
- Never share passwords!
- Keep Operating System(s) (e.g., Windows) on home computers/devices up to date
- Activate security on your home devices – Nest, Google, Alexa, Garage Door Opener, Cameras…
- Power Cycle your home computers/devices weekly at a minimum
- Social Media – be mindful of what you share with others
- Avoid using Public WiFi
- Do not access personal, company, or financial information while connected to a Public WiFi Network
- Log in or send personal information only to websites you know are fully encrypted – (URL starts with https)
- Do not stay logged in to your accounts (log out properly)
- Change settings to not automatically connect to free WiFi networks – (Coffee Shops, Hotels, etc.)
- Use a VPN service to access company data when connected remotely
Company Cyber Security
Follow Corporate IT policy
- Internet Browsing – check browser address bar to confirm website addresses
- Never leave device unattended or unlocked (Windows key + L)
- Keep passwords secure – no Post-It notes
- If traveling with a laptop, make sure it is secure and out of sight when not in use
- Validate sender’s email address
- Identify any misspelled words, poor grammar, or missing punctuation
- Determine if the email request is out of the ordinary. Does it follow office procedures?
- Does the email sender’s tone appear desperate or urgent?
- Are there logos or links on the email that look unfamiliar, fuzzy, old, or incorrect?
- Does the Subject line contain questionable tags or appear odd?
- Does the email request you to click on a link or open an attachment?
Share this article