1. Understand your systems
Hackers seeking to gain entry into a computer system look for the weakest link. Poorly constructed passwords and unencrypted data, for example, give cybercriminals a point of entry. So do shared passwords and untended computers that don’t lock automatically after a set number of minutes.
“Don‘t forget the simple things,” he advised. “Use passwords and lock your computer screens. Writing your password on a Post-It note attached to your computer defeats the purpose. It’s crucial to understand your system and how you’re set up.”