Hit enter after type your search item

Why hygiene habits in the digital environment? – TEDIC

Why hygiene habits in the digital environment? - TEDIC 1

What we are looking for with this type of article is that you improve your protection on the Internet and increase it because we know that the digital environment, like the offline environment, is full of threats. The concept of "digital hygiene" could be seen as normal practice, which enables us to keep our digital environment as "clean" as possible.

The first and one of the most important elements are the best practices for using passwords . For this reason, we recommend that you read our article: The Chaos of Passwords. With this in mind and in terms of hygiene, we recommend that you change your password regularly, for example every 6 months. Our password FAQ entry is also available.

A second element to be considered relates to the update of programs or applications that are on our devices. For desktop devices, the three most popular devices – Mac, Linux and Windows – have their own update mechanisms, both for the operating system and for the installed programs and libraries. There are also "stores" on mobile devices, whose application update mechanisms are available. In all cases, we recommend updating whenever possible : It is best to do this every time updates appear, or to check for updates every week. You could set a specific periodicity, for example: "Monday of updates".

We also recommend – especially on mobile devices – to check the applications you are not using as there have been many cases of malware infections. Think of the maxim of "The larger a system is, the more unstable and uncertain it becomes" . It is therefore recommended to regularly check and uninstall the apps you are not using.

Another point that can be interesting for attackers is the abandoned accounts . They can even be used to impersonate third parties and commit wrongdoings. We therefore recommend that you delete accounts that you no longer use. In many cases, you may not even remember which accounts you had where. You can search your password manager or your browser's saved accesses to find and delete them.

One last element to consider is the back . There is no other choice, your hard drive may be defective, your phone may be stolen, or you may accidentally delete something. To reduce risk, you should implement backup planning that includes:

  • certain periodicity for example once a week
  • that the backups are encrypted regardless of whether you are using the "cloud" or a hard drive externally
  • which are incremental : This way you can manage more backups with a relatively small footprint over time.

Some platforms, such as Android and iPhone, use "cloud" mechanisms to store your information and retrieve it in the event of a disaster. In these cases, you should know that most of these platforms provide your backups when needed by government agencies like the FBI or the NSA. A second consideration is that these companies use your data to create your profile and then sell that information. On the other hand, it is important to know that there are other forms of backup that require more configuration work and are more sovereign at the same time, such as the combination of tools such as Syncthing and Oandbackup, which are beyond the scope of this article.

On the desktop, the Mac has a system called Time Machine that you can use to create encrypted backups on an external hard drive. GNU / Linux has several programs that can be combined, e.g. B. TimeShift and Déjà Dup to secure the operating system and your data.

Finally, there is a program called Duplicati that works for all operating systems and allows you to create regular backups and incrementally so that all requirements are met the most interesting Characteristics in the matter. This seems to be the best option for those using Mac or Windows as all of the required features are available in free software. It can also be combined with external repositories ("cloud") so that the backups are physically in a different location.

In summary, we recommend that you check these 4 elements regularly:

  • Password Hygiene
  • Application Hygiene
  • Account Hygiene
  • Backups
  • [AusgewähltesBild:19459012s] Licensed CC0

Leave a Comment

Your email address will not be published. Required fields are marked *

This div height required for enabling the sticky sidebar
Ad Clicks : Ad Views : Ad Clicks : Ad Views : Ad Clicks : Ad Views :