Five practical ways to protect your campaign

As a kickstart to your cyber security Cyber securityThe protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information. More specifically, cyber security includes the body of technologies, processes, practices and response and mitigation measures designed to protect networks, computers, programs and data from attack, damage or unauthorized access so as to ensure confidentiality, integrity and availability. planning, here are five practical measures you can take right now to make your campaign more secure.

Use unique passphrases and complex passwords.

Don’t share passwords. Don’t use the same password for multiple accounts, websites or devices.

Use two-factor authentication Two-factor authenticationA type of multi-factor authentication used to confirm the identity of a user. Authentication is validated by using a combination of two different factors including: something you know (e.g. a password), something you have (e.g. a physical token), or something you are (a biometric). (2FA) when available.

Use as many security options (settings) as you can for each social media and email platform.

Know your options for delegating authority (what to do when you need multiple users to access one account).

Use only new USB memory sticks purchased by the campaign team. Use them for campaign-related work only. Do not use them on untrusted computers.

Secure data stored in the cloud or online by turning on the available security features. Consider storage solutions with restricted access.

Back up your vital campaign information and know where you have it backed up.

Practice recovering your data at least once. This way you’ll know what to do if you become a ransomware RansomwareA type of malware that denies a user's access to a system or data until a sum of money is paid. victim.

Those updates are crucial to your security: they contain what we call security “patches.” Don’t ignore them.

Be sure to apply updates to your mobile applications in addition to your device operating systems and get them to automatically update.

Schedule a mandatory training session in which all campaign members update their devices and apps.

Know how to spot phishing PhishingAn attempt by a third party to solicit confidential information from an individual, group, or organization by mimicking or spoofing a specific, usually well-known brand, usually for financial gain. Phishers attempt to trick users into disclosing personal data, such as credit card numbers, online banking credentials, and other sensitive information, which they may then use to commit fraudulent acts. and spear-phishing messages.

Be wary of suspicious links – don’t click on them.

Use anti-virus VirusA computer program that can spread by making copies of itself. Computer viruses spread from one computer to another, usually without the knowledge of the user. Viruses can have harmful effects, ranging from displaying irritating messages to stealing data or giving other users control over the infected computer. or anti-malware MalwareMalicious software designed to infiltrate or damage a computer system, without the owner's consent. Common forms of malware include computer viruses, worms, Trojans, spyware, and adware. software on computers.

Date modified: