Search
PRIVACY & LEGAL

Data Protection Security

7 Ways to Protect Your Data & Information

The Maples Group is committed to ensuring that your information and data is always protected and safe, using robust security systems and protocols.  We also appreciate that our clients’ own practices are important in ensuring that your computers and mobile devices are protected from viruses and other errant software that can lead to malicious damage and have harmful consequences.

The following security measures are vital in the fight against cyber threats, hacks, scams and phishing attacks.

1. Protect Your Passwords

Passwords are essential for protecting sensitive information and accounts from unauthorised access.  In the era of digital transformation, everyone now has a significant number of accounts that require passwords, therefore, it is important to keep them secure.  If one password is stolen, cracked or compromised it can have an effect on your entire online presence.

Passwords should be kept secure by using unique sequences on each service to which you sign up.  Combinations of upper and lowercase, along with letters and symbols is the best way to create a strong password; and by increasing the length and complexity, you can make a password that will last for a long time before it is cracked (provided it is also unique).  Using a password manager enables you to securely store passwords and can help to generate new ones for each account.

2. Be Wary of Unexpected Communications

Social engineering attacks rely on human interactions and manipulation, rather than technical vulnerabilities.  Email, phone, text / social media messages and in-person interactions are all forums through which scammers can attempt to trick individuals into sharing sensitive information or doing something to benefit a rogue party.

‘Tax refunds’, ‘overdue bank fees’ and ‘account disabled’ are all common attention-grabbing subjects of emails, texts and messages designed to make you react without thinking about the validity of the content.  Once you have clicked that link or opened that attachment it may already be too late, so taking those extra few seconds to re-read an email is crucial.  Be wary of emotional triggers, bad spelling or an invitation to do something out of the ordinary, as these are some of the red flags of fraudsters trying to entice you to engage with malicious content.

Spoofing legitimate accounts or using compromised accounts is a rising trend, therefore, if a communication seems out of the ordinary always verify via your usual contact method (email, call to a known safe number, visit to a local branch or office, or browse to the official website).

3. Keep Your Software Updated

Switch on automatic updates for your devices, browsers and applications and ensure you are always running the latest versions.  Be wary of ‘updates’ sent via email, as these are commonly phishing attacks.

Software updates are a crucial security practice, as devices with outdated software can contain vulnerabilities that can be exploited by hackers, especially if those devices connect to the internet.

4. Keep Your Personal Information Private

Be wary of what you share with strangers or directly on your social media platforms.  Make your accounts private so that only those persons with whom you are connected can view the content.  Review your privacy settings to ensure you are comfortable with the way your data is used.  Be wary of connection or friend requests from strangers.

Cyber criminals use personal information to launch targeted social engineering attacks and may use it to try and trick you into unsuspectingly sharing private information.

5. Enable Two Factor Authentication, Where Possible

Two Factor Authentication (“2FA”) is a powerful tool that adds an extra layer of protection to your accounts.  By requiring a code or fingerprint in addition to your password, you must manually approve your logins, making unauthorised access more difficult, even if your username and password have been compromised.  2FA alerts you to potential cyber-attacks, issuing notifications of attempts to log in from a new device or location.  Your username and password may be breached, but with 2FA you have ultimate control over access and can react to cyber threats, accordingly.

6. Wi-fi Woes

Securing WiFi in public and private spaces is important to protect your sensitive information.  Public WiFi networks are often unsecure and can be accessed without a password, or with a weak one.  When other people use the same network as you, they can potentially intercept the information between your device and the internet.  It is also recommended to use a VPN which can help to secure connections, even on public WiFi.

Private WiFi networks (e.g. in homes) are also often unsecure.  Settings should be changed from the default username and password to prevent unauthorised access, and you should also consider setting up a guest network for working from home devices and visiting guests.

7. Secure Your Devices

Do not leave your devices lying around where others can easily access them.  Always ensure that you set a strong password and always lock your devices before leaving them unattended.  If you are viewing sensitive data, be mindful of ‘shoulder surfing’ and, if necessary, delay looking at the data until you are in a more secure environment, especially in public spaces and transport.  Consider built-in security features to track your devices, should you become separated from them, and installing anti-malware applications as an additional layer of protection.

Menu