Add Your Heading Text Here

This checklist against cybercrime on the Internet helps to improve protection for consumers and companies with simple measures. The following 6 points are summarized in such a way that even laypeople can practice them in everyday life.

Checklist with 6 points for more security on the Internet

1. Updates of operating system and apps

Computers, smartphones and tablets need regular updates. These should not be put off indefinitely. Install updates regularly and promptly. Update the software (operating system, applications, apps). Also update your browsers (Chrome, Edge, Safari, Firefox, etc.), as they are usually your window to the Internet.

2. Beware of the unknown

Whether in the office or at home, you must be vigilant because every email can contain a phishing attack or a dangerous computer virus. Do not open the attached attachments without checking. Ransomware is now often spread via email. Companies should separate their regular user accounts from administrator accounts to avoid the risk of compromising administrator access.

Hackers want to make money by attacking your systems and data

3. Back up data regularly

Perform manual data backups regularly and ensure that automated backups are also performed. People tend to forget to do backups or continually postpone them. Ransomware attacks are usually successful in extorting ransom because companies and their employees have not performed data backups. Store the backups where computer hackers cannot get to them.

4. Hilfreiche Regeln befolgen

As already mentioned, companies are often attacked via email. These BEC attacks (Business Email Communication) are so sophisticated that it is very difficult to detect the fake. However, there are methods to carry out a check very quickly. This procedure is usually part of a cyber security awareness program. The detection of fake messages is also often presented in security awareness training.

5. Implement emergency plan

ISO 27001 requires companies to prepare for emergencies. An emergency plan should be available both digitally and on paper. In a digital crisis, IT systems can fail, which means that a purely digitally stored emergency plan would not be accessible.

6. Check and correct

You should regularly check your security measures for their effectiveness. In companies that are certified according to ISO 27001, the check is carried out using internal audits. It is important to check that processes and rules in the organization are implemented in accordance with the standards. What is the point of a password policy if the passwords are stuck on a yellow piece of paper on the screen? The internal audit report gives management an insight into the actual level of implementation of the information security management system.