5 New Year's Resolutions for a Cyber Secure 2021

You’ve likely made a number of New Year’s resolutions. Maybe you want to eat healthier, stop smoking, or be more active in 2021. Many of us consider how we might like to change certain aspects of our lives, but our online existence is often overlooked.

If 2020 taught us anything, it was to expect the unexpected and plan for the worst. We also saw a number of devastating data breaches last year that reminded all of us that nothing - not even a global pandemic - stops cybercriminals from wreaking havoc.

As we all hope for a better year ahead, the continued increase in online activities makes cybersecurity more important than ever. Resolving to take simple steps to make you, your family, and your organizations more cyber secure will set you up for a successful 2021. Here are 5 resolutions for this year that you can keep.

1. Update Your Passwords

instagram login screen

A recent study revealed that most Americans use short, uncomplicated, and often predictable passwords. According to the data:

  • Nearly half (45%) of Americans use passwords that are eight characters or less.

  • 25% of Americans share their personal passwords with other people.

  • Just 15% of Americans use strong password generators. 

Look, we get it, passwords are annoying. But the truth is, passwords that are too obvious, short, or reused make it easy for hackers to access your personal data. In 2021, it’s time we start making password hygiene as commonplace as personal hygiene.

If the idea of changing your passwords frequently, creating complex pass phrases, or trying to come up with more than one password you’ll remember sounds nightmarish; it’s time to consider a password management tool. With only one password to keep track of - coupled with multi-factor authentication - you can ensure your passwords remain secure and virtually impervious to cyber attacks.

At Kotman Technology, we recommend a password management tool such as LastPass or Dashlane to our clients. Not only is it a security tool, but in many ways a productivity tool. These tools have also priced themselves well in an effort to be affordable for businesses of all sizes. Various password management tools also offer individual memberships completely free of charge.

2. Use Multi-Factor Authentication

Multi-Factor Authentication, also known as MFA, is a security system that verifies a user’s identity by requiring multiple credentials. Rather than just asking for a username and password, MFA requires additional credentials - or multiple factors - to verify it’s really you trying to access sensitive data.

MFA is an effective way to provide enhanced security. Traditional usernames and passwords can be easily stolen or hacked, but MFA creates multiple layers of security to make unauthorized access more difficult. With MFA, a cybercriminal may steal one credential but will likely be unable to access the second necessary credential. 

Many online services now offer MFA, so be sure to take advantage of it whenever possible. 

3. Stay Updated

laptop computer on table

We know those “Update Available” notifications happen at the worst possible times (typically when you’re in the middle of something important and past due). But don’t ignore them. Not updating your software could result in much worse consequences, like identity theft and malware infections.

Outdated software makes your device more vulnerable to hackers, as updates often include patches for security vulnerabilities that have been uncovered since the last iteration of the software was released. 

In many cases, you can set updates to run automatically, often while you’re sleeping, so you don’t have to worry about downtime.

4. Be More Careful With Emails

Today’s email scams are more sophisticated than ever. Cybercriminals use email messages to trick you into giving them your personal information with phishing attacks. 

A phishing attack is a form of social engineering where cyber criminals attempt to trick individuals by creating and sending fake emails that appear to be from an authentic source, such as a business or colleague. The email might ask you to confirm personal account information such as a password or prompt you to open a malicious attachment that infects your computer with a virus or malware.

These are one of the most common online threats, so it’s important to know how to spot them and what to do when you encounter them. Here are 5 common signs of a phishing email:

  1. The email is unsolicited

  2. The email wouldn’t pass a spelling test

  3. The URLs and email address don’t look quite right

  4. There’s an unnecessary attachment

  5. The email is designed to induce panic

Learn more about how to spot phishing emails.

5. Stop Oversharing

social media icons

From what we’re eating to breakfast to how we vote, we live in a society that shares everything on social media. While this means of connecting with friends and family can have a multitude of benefits, there are also potential negative consequences of our oversharing. 

Many people share their hometown, email address, phone number, date of birth, and various other personal data on social media platforms. While not terribly exposing on their own, these key pieces of information can be used to construct a fuller picture of who you are, in order to steal your identity or access your accounts.

Facebook, Twitter, and other platforms are not secure forums so thinking before you post is essential for your privacy and safety.

There you have it. Five simple cybersecurity resolutions that can help you to stay one step ahead of the cybercriminals in 2021, and beyond. Here’s to the year ahead; may it be better (and more cyber secure) than the last.


Kotman Technology has been delivering comprehensive technology solutions to clients in California and Michigan for nearly two decades. With a customer retention of over 98%, we pride ourselves on being the last technology partner you'll ever need. Contact us today to experience the Kotman Difference.

Previous
Previous

Think Your Business is Too Small to be Hacked? Think again.

Next
Next

5 Signs of a Quality MSP