Good resolutions and best IT practices

Blog articles


Who says new year says good resolutions. And this also applies to cybersecurity! Let’s begin the year with some best practises and daily cybersecurity tips.

1-Use expressions as passwords


We often tend to use rather short passwords and moreover, the same one on several sites. That’s a mistake. Even if your password has numbers, capital letters and special characters, you are not safe from hacking. In fact, an 8-character password, for example G0odBye#, can be cracked within 9 hours with a hacking tool. Better to use rather long expressions. For example, it would take 16 billion years to crack the password « peanutbutterelephant » with the same tool. And yet, it does not contain numbers, capital letters or special characters.

Explanation; each generated password is associated with a hash, a unique signature comparable to a fingerprint. To crack a password, you can use a hash table. The tool then compares the hash of the table with your password. These tables can compare millions or even billions of strings to your password. The longer your password is, the more difficult the comparison becomes and the less risk you take.

2-Always up to date software


It is essential to update your applications and software. These come from different suppliers and may contain bugs even once placed on the market. While these bugs can be mild, they can also seriously jeopardize the security of your equipment.

The update protects against a number of attacks by eliminating exploitable bugs. Also pay attention to the update of your browsers, hackers can also go through outdated or corrupted browser settings.

3-Regular backup of your data


Prevention is better than cure! You may be the victim of ransomware that will hold all of your data hostage. The only solution to get rid of it, erase your entire hard drive and reinstall the operating system. But this manipulation comes at a price, that of making you lose all your data. Thus, we can never advise you enough to play the card of caution and to regularly backup your data via an external hard drive and / or an online backup service.

Mobile terminals, a gateway like any other


Computers are more and more abandoned in favor of smartphones and tablets which we use both to check our emails and our social networks as to make purchases. Logically, more and more hackers are interested in this new playground. Pay attention to the security and legitimacy of the applications that you download. Indeed, if application stores generally ensure that they meet specific security standards, it is not uncommon for compromised applications to escape their vigilance.

Today, most phones and operating systems include mobile data encryption, so don't hesitate to turn it on.

5 - Be aware of the risk to better protect yourself


This is of course the first step towards good IT practices. No, piracy doesn't just happen to others! A little vigilance and common sense on a daily basis should allow you to protect yourself against a number of phishing, phishing and other cyber attacks.

HOW TO CHOOSE YOUR DETECTION SYSTEM ?

Discover our products and detection probes



Download the brochure


Related Contents

This website uses cookies to ensure you get the best experience on our website. Learn more.