Skip to main content

Securing Your Personal Devices

By September 1, 2021Cyber Awareness
Securing-Your-Personal-Devices-The-Magnes-Group

Every day, individuals of all ages spend a significant amount of time on tablets, laptops, and other smart devices. That being said, it’s critical this technology remains secure from cybercriminals and malware. Any device left unprotected could easily be targeted in a data breach, leading to compromised personal information and—in severe cases—identity theft.

To ensure your information isn’t accessed and exploited by cybercriminals, consider these tips to securing your personal devices:

Protect your devices

Use a passcode, PIN, fingerprint lock, or facial identification to keep devices as secure as possible. In a survey by McAfee, a leader in online protection, and One Poll 36% of respondents still do not use password protection. If your devices are not password protected and are then lost or stolen, your accounts are 100% accessible to whoever has control of your device.

Don’t forget to log out

Always log out of mobile apps and websites when you’re done using them. If you don’t log out and someone gets access to your device, they could quickly locate and steal your login credentials or other personal information.

Use Two Factor Authentication (2FA)

The best way to secure your accounts is two-factor authentication or 2FA. This is a process that gives web services secondary access to the account owner (you) in order to verify a login attempt. Typically, this involves a phone number and/or email address. This is how it works: when you log in to a service, you use your mobile phone to verify your identity by either clicking on a texted/emailed link or typing in a number sent by an authenticator app. Here are some of the best according to PC Mag.

Use Wi-Fi cautiously

No one wants to burn through their cellular data when wireless hot spots are available—but free Wi-Fi networks are usually unsecured which can spell danger to you. Avoid connecting devices to public or unsecured (no password required) Wi-Fi networks. Use only legitimate, private networks—and never conduct financial business or access sensitive data while on public networks.

Keep a remote backup of critical data

Back up! Back up! Back up! Seriously, back up any sensitive information to your computer or to a cloud-based service.

Use an antivirus program

These programs provide enhanced security—safeguarding your apps, documents, and other important files from being infected with malware before you open them.

BYOD (Bring Your Own Device) at your own risk

According to Kaspersky, as business users are granted high-level access from personal mobile devices, smartphones and tablets are effectively replacing desktops for many business tasks. However, personal mobile devices don’t offer the same level of built-in security or control as the organization-owned desktop computers they are replacing. Use caution when deciding to BYOD

Technology will always be a target for viruses and cyberattacks. Nevertheless, following these tips for securing your devices will help keep you (and your information) safer.

How Can We Help?

Simply put we are here to support you and to be your trusted advisor. We have tools to help you design risk management plans and various cyber liability tools.

Our proactive service allows us to meet with you at least twice annually and each meeting has a specific agenda and goals. These meetings help us learn more about your business. No one knows more about your business than you do, so to help us tell the best story to our insurer partners it’s our job to know, too. Where possible, let us introduce you to your underwriters or underwriting team, this way they become more invested in your business and are more likely to go to bat for you when needed the most.

Questions? Concerns? Drop us a line and we’ll be in touch.

Contact Us

  • This field is for validation purposes and should be left unchanged.
Skip to content