Corporate Responsibility

Ten tips for more security on any system

  • Share
    Two clicks for more data privacy: click here to activate the button and send your recommendation. Data will be transfered as soon as the activation occurs.
  • Print
  • Read out

PC, notebook, or smartphone – our tips will help you create more security

We rely on our technology around the clock, both in our personal and our working lives. Smartphones and computers help us to do our work and organize our lives. This means that a theft or attack by a criminal can have a direct impact on our lives. Better, then, to take precautions!

10 tips for more security
  1. Secure your data:
    Business documents, scanned bills, tax information, photos, and videos – all important files that could be irretrievably lost. Take action before it is too late. Be sure to back up your files regularly and update the backup in order to minimize the loss in the event of a scam.
  2.  Keep your system up to date.
    Operating systems and applications must always be state-of-the-art in order to eliminate any gaps in security. If possible, enable automatic updates, which will allow your system to stay up to date on its own.
  3. Stay vigilant and skeptical:
    Do not fall for phishing and other attempts to intercept your sensitive information. Question emails from people you do not know. Look at a website carefully before you disclose information on it. Check the legitimacy of merchants . In short, stay calm and use common sense when you are online.
  4. Lock your device when you do not need it.
    Whenever you put your smartphone away or leave your notebook, it is best to lock it. Every operating system has shortcut keys for locking access to the system – for example, in Windows, it is Win+L. On a smartphone, you can usually do it by simply pressing the on/off button.
  5. Handle your privacy with care:
    Think seriously about what information you are posting on social networks. Take privacy protection seriously. Many hacking attempts are based on “social engineering” – in other words, attackers first try to find out as much as possible about the person they are targeting. Often they can use this information to figure out a simple password. Such information is also useful to criminals who commit identity theft. Make it hard to track you when you are browsing online.
  6. Minimize risk.
    Check the authorizations you have granted to apps on your smartphone or computer. Only install apps from familiar and official sources. If possible, work with a simple user account that has no other access on the system. Be sure to use strong passwordsWhat you should know about password managers and change them regularly. Encrypt your system’s hard drive. All operating systems have the tools to do this. If you use cloud storage, only store your documents there in encrypted form.
  7. Store sensitive data externally.
    Sometimes computers are used to store sensitive and finance-related data that is actually only used occasionally, such as insurance policies, digital account statements, credit card bills, or your latest tax return file. Think about which data you do not need constantly and store it on an external data carrier. This will reduce any possible losses if your device ever breaks. However, also remember to back up this external data carrier regularly.
  8. Be prepared for an emergency.
    If you already have an emergency system set up, you will be prepared if the system breaks down or is attacked by malware.
  9. Communicate securely.
    Encrypt important emails and files. If you want to use public Wi-Fi on the go, use a VPN tunneling connection. Follow security procedures when banking online.
  10. Be vigilant when you are in public.
    Be discreet when you work or handle important matters in public. Many notebooks have privacy shield attachments that make it difficult for observers to identify the content on your screen. There are some phone calls that you should not make in public, such as when you are ordering from a merchant or handling a bank transaction. 

Further reading