Cybersecurity Controls

Awareness

The human factor is the weakest link. No matter how secure your networks, devices, and online accounts are, if you fall for a scam, no security measure can prevent an attack. Follow the tips below.

01

Do not click on links sent via email or message unless you know the sender and do not find the message suspicious.

02

Do not open attachments sent via email or message unless you know the sender and do not find the message suspicious.

Learn more in the following articles:

Networks

Follow these recommendations to keep your networks protected from unauthorized access, whether they are home or business networks.

01

Use a firewall between your ISP’s router and your devices.

02

Segment your networks – for example, if you work from home, keep your personal network separate from the network your company devices connect to. Also, separate the network for children, IoT devices, and guests.

03

Apply the same separation for your Wi-Fi networks, mapping them to the respective networks mentioned in point 02. For instance, the personal SSID should be configured for the personal VLAN, the IoT SSID for the IoT VLAN, and so on.

04

Keep the Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) active.

05

Use the WPA3 protocol on your Wi-Fi networks or, at the very least, WPA2/WPA3 for compatibility.

Learn more in the following articles:

Devices

Follow these recommendations to keep your devices protected from unauthorized access.

01

Keep the operating system of your devices up to date.

02

Keep your applications up to date.

03

Do not grant permissions that do not make sense and review them periodically. For example, does the calculator really need access to Contacts or Files?

04

Do not grant permissions that do not make sense and perform a review periodically. For example, does the calculator really need access to Contacts or Files?

05

Do not use accounts with administrative privileges on a daily basis. Use standard user accounts and elevate privileges only when necessary, such as when you need to install an application.

06

Uninstall programs that you do not use. Regularly review the installed applications to keep only those you need.

07

Disable features and technologies you don’t need at the moment. For example, keeping Bluetooth off when you don’t need it not only saves battery life but also makes your device more secure.

08

Make sure to have a good antivirus installed on all your devices.

Learn more in the following articles:

Online Accounts

Follow these recommendations to keep your accounts protected from unauthorized access.

01

Use passwords that are at least 14 characters long.

02

Use unique passwords for each account.

03

Do not store your passwords in plain text — whether on paper (like post-its), in text files, or in notes on your devices.

04

Do not store your passwords in browsers.

05

Use Password Managers to securely and organizedly store all your passwords. This way, you’ll be able to create strong passwords, as you’ll only need to remember the master password required to unlock your vaults.

06

Do not share your passwords, but if you must, use secure methods—avoid sharing them via SMS or email.

07

Enable Multi-Factor Authentication (MFA) on all your accounts, preferably with security keys or Authenticator apps.

Learn more in the following articles:

Financial Security

Follow these recommendations to protect your financial assets.

01

Never share your physical card details. Instead, create virtual cards with usage limits.

02

Never give your physical cards to anyone. Remember, they contain all the necessary information to make a payment.

03

Use wallets with RFID blocking to prevent someone from approaching a payment terminal to your pocket and making payments without you even noticing.

Learn more in the following articles:

Bonus: Paranoid Mode

If you already have the controls from the previous points applied, it’s time to take the next step towards paranoia 😀

01

Perform a factory reset on your devices every so often, ensuring they are clean of any silent malware.

02

Use physical camera blockers on all your devices to ensure that, even if software controls are bypassed, no one will be able to spy on you.

03

Use physical microphone blockers on all your devices to ensure that, even if software controls are bypassed, no one will hear what you say or the environment around you.

04

Use Faraday boxes for your car key fobs, both primary and spare.