sb-nz logo
Story image

Norton's top tips to stay safe online

Following the release of the annual Norton Cyber Security Insights Report, which aims to shed light on the truth about online crime and the personal effect it has on people, Norton is sharing some tips on how people can stay safe online.

“Just as we don’t leave our front door open when we head out on holiday, we shouldn’t leave our information vulnerable online,” the security specialist says.

“By adopting a few basic behaviours, we can make big strides in mitigating cybercrime risk,” it says.

Norton Top Tips to Stay Safe Online:

  • Avoid password promiscuity: Protect your accounts with strong, unique passwords that use a combination of at least 10 upper and lowercase letters, symbols and numbers to help keep the bad guys at bay. Make it difficult for attackers to access your information by changing your passwords every three months and not reusing passwords for multiple accounts. That way, if a cybercriminal gets your password, they can’t compromise all of your accounts. And if it’s too overwhelming to keep up this practice, use a password manager to help!
  • Don’t go on a phishing expedition: Think twice before opening unsolicited messages or attachments, particularly from people you don’t know, or clicking on random links. The message may be from a cybercriminal who has compromised your friend or family member’s email or social media accounts.
  • Don’t keep a (dis)connected home: When installing a new network-connected device, such as a router or smart thermostat, remember to change the default password. If you don’t plan on using the Internet feature(s), such as with smart appliances, disable or protect remote access when not needed. Also, protect your wireless connections with strong Wi-Fi encryption so no one can easily view the data traveling between your devices.
  • Be in control when online: Entrust your devices to security software to help protect you against the latest threats. Protect all your devices with a robust, multi-platform solution, like Norton Security Premium.
  • Know the ins and out of public Wi-Fi networks: Accessing personal information on unprotected public Wi-Fi is like broadcasting your entire screen on TV – everything you do on a website or through an app, could potentially be exposed. Avoid anything that involves sharing your personal information (paying a bill online, logging in to social media accounts, paying for anything with a credit card, etc.).
Story image
Data leakage concerns dominate cloud security perceptions - Bitglass report
How secure is the public cloud? That’s what many IT and security professionals are asking as data leakage becomes a pressing concern for organisations and their data protection strategies.More
Story image
Video: 10 Minute IT Jams - Vectra AI exec discusses cybersecurity for Office 365
In Techday's second IT Jam with Vectra AI, we speak again with its head of security engineering Chris Fisher, who discusses the organisational impact of security breaches within Microsoft O365, why these attacks are on the rise, and what steps organisations should take to protect employees from attacks.More
Story image
Trend Micro integrates with AWS Network Firewall
As a Launch Partner, Trend Micro has integrated managed threat intelligence feeds from its cloud security solution to enable superior protection in line with this new AWS managed firewall service.More
Story image
Claroty and CrowdStrike form partnership to protect industrial control system environements
The integration will deliver visibility into industrial control system (ICS) networks and endpoints, with a one-stop-shop for information technology (IT) and OT asset information directly within The Claroty Platform.More
Story image
In the sprint towards digital transformation, don’t neglect your data
Three tips to locate, secure, and understand dispersed corporate data.More
Story image
Microsoft NZ Partner Awards winners announced
Each of the 10 winners demonstrated ‘outstanding ways they are continuing to empower customers through clever use of Microsoft technology’.More