Mobile Menu

How to Protect Your Data and Devices: Top 10 Tips

Top 10 Cybersecurity Tips

With the continuous advancement in technology, there are greater risks associated with cyber crime with the increase in malicious links, viruses and trojans. With data breaches becoming more and more frequent on unsuspecting victims, the need for cyber security is greater than ever. Users need to be more aware of the safety protocols they must follow in order to protect themselves and their devices from being compromised.

Here are Salt Communications’ top 10 cybersecurity tips:

  1. Always remember no user is immune from cyber attacks!! You are a target for all hackers.
  • Stick to using your own personal device, try to limit using other devices and never share your credentials with others.
  • Be careful with what you click.
  1. Keep up to date with security updates.
  • Security patches are issued when security flaws are discovered.
  • While it can become annoying to constantly get notification updates, consider it the lesser of two evils.
  • Turn on automatic updates for your devices.
  • Use web browsers such as Chrome or FireFox that receive frequent and automatic security updates.
  1. Use public wireless hotspots wisely.
  • If using public wifi make sure you use a Virtual Private Network (VPN).
  • Using a VPN means the traffic between your device and the VPN server is encrypted. This makes it more difficult for hackers to obtain the data on your device.
  1. Back up your data on both physical locations and on the cloud.
  • Use the simple 3-2-1 backup rule used by the top IT and security managers.
  • Keep three copies of your data on two different types of media (local and external hard drive) and one copy in an off-site location (cloud storage).
  1. Be conscientious about removable media / what you plug into your device.
  • Malware can be infected to devices through flash drives, external hard drives or even smartphones.
  • Have policies in place to make sure you control all access to these removable media devices.
  • Make sure to scan any device for malware before plugging it into a device.
  1. Practice good password management
  • Use a strong password: 20 characters or more is recommended.
  • Use of a strong mix of characters and never use the same one.
  • Update your passwords periodically, at least once every three months.
  • Do not share these passwords with anyone or write them down.
  1. Use two factor or multifactor authentication
  • Doing so adds additional layers of security to the standard password method of online identification.
  • Two factor authentication (2FA) is an authentication mechanism to double check that your identity is legitimate, making it more difficult for cybercriminals from breachning user’s devices or accounts.
  • Passwords on their own are not as infallible as users need them to be. Examples of 2FA include: Personal Identification Code, another password or even a fingerprint.
  1. Be aware of phishing attacks
  • Phishing attacks occur when an attacker poses as someone or something in order to trick the recipient into divulging credentials.
  • It occurs when the recipient clicks a malicious software or opens an attachment that then infects a user’s system with malware or trojans.
  • In order to avoid, don’t open emails or messages from people you do not know.
  • Do not click any links or attachments.
  • While some email addresses may look official, they usually contain inconspicuous differences that redirect users to a fraudulent site.
  1. Secure your mobile devices
  • Lock your device with a strong PIN or password.
  • Only install apps from a trusted source.
  • Keep your device operating systems updated.
  • Do not click on links or attachments from unsolicited emails or texts.
  • Carry out confidential calls and send important information through a trusted secure enterprise communications platform- such as Salt Communications.
  1. Actively monitor your network by installing antivirus protection and using a firewall.
  • Installing a firewall system means all incoming and outgoing network traffic is filtered to reduce or eliminate the occurrence of unwanted network communications while allowing legitimate communications to flow freely.
  • Installing antivirus software detects and deletes malicious codes to prevent malware from causing any damage to devices.

As the use of digital devices has now become a part of everyday life, both in day to day life and in organisations, there is a heightened need to be more aware of cybersecurity. By implementing security measures users are able to mitigate the risk of cyber attacks. Following these tips allows individuals to protect their data, their devices and their overall privacy.

For more information on this article, or to talk to a member of the Salt Communications team, please contact

About Salt Communications

Salt Communications is a multi-award winning cyber security company providing a fully enterprise-managed software solution giving absolute privacy in mobile communications. It is easy to deploy and uses multi-layered encryption techniques to meet the highest of security standards. Salt Communications offers ‘Peace of Mind’ for Organisations who value their privacy, by giving them complete control and secure communications, to protect their trusted relationships and stay safe. Salt Communications is headquartered in Belfast, N. Ireland, for more information visit our website.

Share This Post

Explore More