Skip to content
crmnuggets
Menu
  • Home
  • CRM
    • SCRUM
    • ITIL 4
  • ABOUT
  • RCCG SOD
  • DEVOTION
  • PROJECT MANAGEMENT
  • MORE
    • RCCG SUNDAY SCHOOL TEACHERS
    • RCCG SUNDAY SCHOOL MANUAL
    • COMPUTER SECURITY
    • DIGITAL MARKETING
    • CYBER SECURITY
    • MFM 70 DAYS FASTING
    • BUSINESS ANALYSIS
    • BUSINESS CONTINUITY MANAGEMENT
    • KEDI HEALTHCARE
  • TERMS
  • PRIVACY
  • HIRE ME
Menu
13 Ways To Avoid Cyber Security Threats

13 Ways To Avoid Cyber Security Threats

Posted on February 8, 2021July 2, 2025 by Adeniyi Salau

In my previous article, I have discussed some of the facts that you need to know about phishing and Business Email Compromise generally. In this article, I want to look at some of the facts that you need to put into consideration in order to avoid cyber security threats. Follow me as we will look at that together in this article. 

 

Security threats come from everywhere, all over the world, 24 hours a day, 7 days a week, and 365 days a year. Moreover, human error is the root cause of almost every single data breach that happens worldwide. 

  • Always follow the company policy and data handling guidelines. If you are not sure about a policy, please ask. There are no dumb questions. 
  • You need to back up sensitive and critical information on an encrypted device with a strong password. 
  • Be aware of shoulder surfing or people who hang around your desk and act suspicious. They might be looking for confidential information or watch you as you enter your password. 
  • Do not write or leave passwords on notes posted on or under your desk, computer or keyboard. 
  • Keep your desk free of any proprietary or confidential information, and securely lock private information away in a desk drawer when you leave your workstation for an extended period, and at the end of the day. 
  • Lock your computer screen and cell phone every time you step away to prevent anyone from seeing or manipulating confidential information on your device. 
  • Report broken doors, windows and locks to your security personnel as soon as possible. 
  • Report suspicious activity in or near your facility’s entry and exit points, loading docks parking areas, garages, and immediate vicinity, and always remember to lock your car. 
  • Report suspicious packages, and do not open or touch them.
  • Shred and destroy all documents that contain sensitive personal or organisational information rather than tossing them in the waste bin. 
  • Treat all devices such as a computer, CD ROM, USB Devices, and laptop as sensitive if they contain proprietary and sensitive data. Never share it with any unauthorised person, which includes your family members.
  • Use your badge to enter your workplace and do not allow tailgaters. Check for identification and ask a lingering individual to identify the purpose of their visit to your workplace. 

Action Point

PS: I know you might agree with some of the points raised in this article or disagree with some of the issues raised.

Please share your thoughts on the topic discussed. We would appreciate it if you could drop your comment. Thanks in anticipation.

 

WhatsApp: @CRMNuggets Community

 

 
Follow Us on Facebook: CRMNuggets
 
Follow on X Platform 

DOWNLOAD RCCG SOD YEAR 1 TO YEAR 10 MANUAL

 Provided by SendPulse

 

Follow on TikTok @crmnuggets

Sharing Is Caring. If you enjoy this article, help us share with others.

DOWNLOAD 10 DIGITAL MARKETING EBOOKS FOR FREE

 Provided by SendPulse
truehost

Related Posts:

  • Top PMBOK 7 PMP Questions And Answers
    Top PMBOK 7 PMP Questions And Answers
  • Link Building Techniques
    64 Link Building Techniques To Follow In 2023
  • Understanding Insider Threat In Network Security
    Understanding Insider Threat In Network Security
  • PMP Test Questions For Practice & Preparation
    119 PMP Test Questions For Practice & Preparation
  • Email
    Designing An Effective Email Campaign: How To (+Examples)
  • 12 Powerful SEO Techniques For 2023
    12 Powerful SEO Techniques For 2023 (+Examples)

Powered by Contextual Related Posts

Post navigation

← Facts About Superlife Colon Care SCC 15
Understanding Insider Threat In Network Security →

SEARCH THROUGH OUR BLOG

NAVIGATE HERE

TRENDING

  • Top PMBOK 7 PMP Questions And Answers
    Top PMBOK 7 PMP Questions And Answers
  • Link Building Techniques
    64 Link Building Techniques To Follow In 2023
  • Understanding Insider Threat In Network Security
    Understanding Insider Threat In Network Security
  • PMP Test Questions For Practice & Preparation
    119 PMP Test Questions For Practice & Preparation
  • Email
    Designing An Effective Email Campaign: How To (+Examples)
  • 12 Powerful SEO Techniques For 2023
    12 Powerful SEO Techniques For 2023 (+Examples)
  • How To Create High Performing Emails 
    Creating High Performing Emails : How To Do It…
  • Series 12: Latest CAPM Questions And Answers
    Series 12: Latest CAPM Questions And Answers
  • Health Benefits Of Vigor Essentials Capsule
    Series 6: Latest CAPM Questions And Answers
  • Digital Marketing Work Hours
    Digital Marketing Work Hours: Best Practices and…

Powered by Contextual Related Posts

CHECK THIS

© 2025 CRMNUGGETS | Powered by Minimalist Blog WordPress Theme