Digital Hygiene

Digital Hygiene Series: Must-Have Practices for Stronger Online Security

So far in our Digital Hygiene Series, we have focused on keeping your systems neat and orderly. However, the most important component of digital hygiene includes practices for stronger online security. A security vulnerability can quickly wipe out all the benefits of good digital hygiene. In this last article of our series, you will learn five vital practices that you can leverage to better secure your systems and accounts and protect your data and identity. 

1. Enable MFA on All Accounts 

If you only take away one thing from this entire article, make it this: MFA is the single most important security feature you need. MFA (multi-factor authentication) is a second layer of authentication you set up on your accounts so that after you supply your username and password, you supply another form of authentication. This can be a code sent to you in a text message or a push notification to your mobile device. This way, if a hacker does get their hands on your password, they are still unable to log into your account because they don’t have this second layer of authentication. Many services, like banks and insurance companies, require MFA when you establish your account. As someone who cares about your security, you should not only set up MFA on those accounts where it is required, but you should also seek out MFA on new accounts you create even when they don’t require it. 

2. Use Strong Passwords 

Simple passwords are easier to crack, so if you use passwords that are short and contain all lowercase letters, you run a high risk of having your accounts compromised. Complex passwords generally contain a combination of lowercase, uppercase, numbers, and symbols, and adhere to a minimum number of characters. Different sources give different recommendations for minimum password length. I recommend at least 16 characters, but the longer the better. You should also avoid using words or phrases that are easy to guess, such as your initials, the current year, or your birthday. 

3. Use Unique Passwords 

In addition to making sure all your passwords are complex enough, you should also never repeat the same password on more than one account. The simple reason is that if your password is compromised once, the attacker now has access to all your accounts that use that password. Ideally, your passwords would not even be similar, like adding an exclamation point, or using the same word or phrase but using all lowercase in one password and all uppercase in another. Minor differences are still easy for an attacker to guess. 

4. Use a Password Manager 

Using passwords that are both complex enough and entirely unique from one another is a huge challenge. A password manager program, such as LastPass or RoboForm, can help tremendously. These programs allow you to store your passwords for all your different accounts so that you don’t necessarily have to remember them. Then, the password manager can input your passwords and log in to your accounts when you need them. Additionally, some password managers offer other features, like health checks that scan all your passwords and alert you on things like repeated passwords or passwords that have not been changed for a long time. Keep in mind: you MUST ensure your password manager is protected by a highly complex password as well as multi-factor authentication. 

5. Monitor the Dark Web 

The dark web is a part of the Internet that is not indexed by search engines and can generally only be accessed by special programs or browsers. The dark web is most infamous for the criminal activity that takes place there. One form of criminal activity is the resale of compromised data, which means that if your data (including passwords) somehow get breached, they may be available to bad actors on the dark web. There are services you can use to run scans on the dark web to find out if your email address or username is associated with any data breaches. Then, you should immediately change your password or take whatever measure is appropriate to secure your data. Some services can run scans for you automatically and alert you when a threat is found. If you are part of an organization, your administrator or IT provider should be running these dark web scans for you. 

Conclusion

Incorporating these practices will go a long way in strengthening your digital hygiene. They will serve as an important first line of defense against new and changing digital threats like malicious emails, social engineering, phishing, and more. Most data breaches are caused by human error, so it’s important to have good security practices in place and remain vigilant in order to protect ourselves as much as possible.

Could your organization benefit from a thorough review of your security practices? If so, please don’t hesitate to reach out to us to schedule an initial conversation. We would welcome the opportunity to learn more about your business and how we can help. 

 Digital Hygiene Series:
Daniel Gilbert

Daniel Gilbert

Chief Operating Officer
Kite Technology Group

Digital Hygiene Series: Tidying Up Your Mobile Devices

Digital hygiene doesn’t just apply to your computer. It’s also important for your mobile devices. In this fourth article of our Digital Hygiene series, we share 5 strategies for tidying up your laptops, cell phones, and tablets. Applying these strategies will go a long way in helping you get the most from your mobile devices and help you be more efficient on the go.

1. Delete Unused Apps 

Just as it is best to keep unused applications off your computer, it follows that you should do the same with your mobile device. It is common to install apps to solve a short-term problem, and if left unchecked, apps like this can be forgotten, taking up storage and maybe even processing power on your phone. As soon as you know you will no longer need a particular app, uninstall it and remove all associated data if you will never need it again. You can also regularly audit your installed apps and remove any that you don’t need. Most mobile devices have an automated process you can enable to identify and even uninstall applications you no longer use. 

2. Organize Home Screen 

Your home screen should be set up deliberately to give you quick access to all your most frequent functions, and should be organized in a simplistic layout so it is easy to navigate. You can arrange apps into categories and use app folders to contain related apps. Ideally, you want to create enough different categories so that your apps are distributed across them, but not so many categories that you end up with categories containing only one or two apps. This is subjective, but generally you know when your app folders are serving you well and when they aren’t. Another great tool for an organized home screen is widgets. A widget is a bite-sized components of your apps you can put directly on your home screen. Examples include a preview of your calendar or today’s forecast from your favorite weather app. If you have found a home screen organization that works well for you, do your best to always keep it that way by putting apps into the proper folders, placing your most common functions close to the home screen, and making good use of widgets. 

3. Storage Consumption 

Eliminating unused apps is a good start at managing your storage, but that is just a small piece among more important kinds of data, such as multimedia and old messages. In the storage settings of your mobile device, you can view your used storage and a breakdown of what kinds of data comprises that used storage. You should be aware of how much data your device can store and how much you are currently using so you don’t run into issues from your device filling up. Photos, videos, and music commonly take up the most space, so it is important to learn about the streaming options you have available in your photos and music apps. When set up properly, these features manage the amount of storage you are using on your local device by moving most of your data to the cloud. You should audit your storage often to make sure you stay ahead of issues before they happen. 

4. Enable Cloud Backup 

Offloading your multimedia as I just discussed is one form of backup, but it is also important that you are running system backups so you don’t lose other kinds of data like contacts, text messages, stored files, and apps. You can set up your backup preferences in your device’s settings to ensure they are happening frequently and reliably. These backups should be running to a cloud service so that if you lose, damage, or otherwise replace your device, you can pick up right where you left off on the new device. Keep in mind, like the data itself, backups take up storage. While it is not a common issue, it is important to avoid running out of capacity in your cloud service to store system backups. 

5. Be Intentional About Contact/Calendar Sync 

Ever since we have been able to set up multiple different email accounts on our mobile devices, the ability to sync contacts and calendars has been a huge benefit but can also be a huge risk if it is not done properly. I have seen many people with a mess on their hands from a contact list that has taken years or decades to amass and has suddenly become inundated with extraneous or duplicate records, or else has been completely overwritten or cleared. With the proper backups in place, these issues are typically reversible, but not without a painful crash course in the ins and outs of calendar and contact sync. You can choose to keep separate contacts and calendars in your separate accounts, and you can certainly combine them and work off only one list. Whichever method you choose, be sure that the proper default account is selected (in your device’s settings) so that new records you create will go to the right place. The confusion here typically happens when concepts like separate accounts and default account are not well understood, so educate yourself on where your contacts and calendars live, and don’t be afraid to consult an expert if you need help. 

Conclusion

As more and more work is done remotely, following these strategies will enable your mobile devices to perform better and help you stay more organized. Keep in mind that if you or your employees are using your personal mobile devices to conduct work, there are crucial security practices that need to be implemented to keep your business and personal data secure. To learn more about this and our Managed IT and Security Services, please get in touch with us to schedule a conversation. We would welcome the opportunity to learn more about your business and how we can help. 

 Digital Hygiene Series:
Daniel Gilbert

Daniel Gilbert

Chief Operating Officer
Kite Technology Group

Digital Hygiene Series: Email Decluttering Tips for Greater Productivity

Email is an invaluable tool for both personal and professional communication. Still, an excessive volume of emails can accumulate in your inbox, making it difficult to manage. In the most recent article in our Digital Hygiene Series, you can learn 5 strategies for managing your email inbox like a pro. As much as we all use email today, it is well worth taking some measures to declutter your email inbox which will help you stay on top of things and have a more productive day. Here are five principles of email management to improve your digital hygiene.

Manage Inbox to Zero

It sounds like a dream, but it can be a reality, and quite a refreshing one when you can maintain it. The key here is to have a system where you immediately act upon emails as soon as you get them so you can quickly get them out of your inbox, either by moving them to subfolders or deleting them. Many emails just require a quick response, so once you respond you can get them out of your inbox. Other emails are more involved and require some action. For these, it is best to transfer the details to some other to-do system, like tasks in Outlook, Microsoft Planner, or your organization’s line-of-business application.

Unsubscribe From Unwanted Lists

Some sources report that as much as 85% of all emails are spam. Most of these emails are not harmful to your security, they are advertisements that just end up being highly annoying at best, and completely clutter your inbox at worst. Most of us just delete these emails, which certainly beats leaving them in your inbox. But the best thing to do with these is to unsubscribe from the mailing lists you don’t want. Legitimate businesses like retail and restaurants send marketing materials periodically, and they all have email preferences you can configure to send you only what you want, or send you nothing at all. Somewhere in all the marketing emails you receive, usually at the bottom, there is an “Unsubscribe” button you can use to adjust your preferences. You should do this immediately for lists you don’t want. Many of these services sign you up automatically for their mailing lists when you do things like set up an account and make a purchase, so be alert for “Opt Out” checkboxes to make sure you don’t end up on these lists in the first place.

Use Mailbox Rules

Mailbox rules can be used to automate repetitive tasks that you would otherwise do manually. One of the most common applications of mailbox rules is to automatically deliver messages from a particular sender or on a particular topic to one of your mailbox folders. It is important to make sure you don’t miss important messages, but implementing something like this can help reduce the noise in your inbox, save you the time of doing steps manually, and remove human error from your methods of organization. There are many triggers you can set up in your rules for things like categories, keywords, and attachments, and there are a wide range of actions they can perform on emails such as flagging, forwarding, and deleting. Experiment with mailbox rules to learn all they can do, and when you work on emails, always be on the lookout for new opportunities to use mailbox rules to your benefit.

Enable Email Archiving

In the second article of this series we discussed how an archiving method for your document and file storage can help separate your working data from long-term storage. The same concept applies with your email. If you have a process to archive emails once they reach a certain age or are no longer needed, the size of your working mailbox remains small, which means it is easier to search and you have less risk of hitting storage limits. You can archive emails with a manual process, but it is best to use an automated process based on age or some other criteria. If you are part of an organization, your administrator(s) should apply email archiving processes to everyone in the organization that are compliant with your company’s data compliance policies.

Master the Search Function

Even with the best of habits in organizing your mailbox, you should know how to effectively use the search function. The search function is most used for emails, but you can also search for other items like Calendar Items and Contacts. The most common search is a keyword search that just looks for the occurrence of a word or phrase, but there is also syntax you can use to find specific criteria, like email from a particular sender or in a particular thread. If you use Outlook, there are lots of resources online like to help you learn how to use the more advanced features of Search. (How to Use Outlook.com Search Operators (lifewire.com))

Conclusion

These are just a few of many strategies that you leverage to keep your email inbox organized. Taking the time to learn how to better manage your email inbox will go a long way in preventing it from becoming congested and overwhelming. When your email inbox is well organized, finding the messages you need can be done in a flash and with little effort. In addition to this, deleting, moving, or archiving the messages that you no longer need will help you be more productive and have time to get more done.

If you are not currently working with Kite Technology and would like to learn more about our  IT and Consulting Services, please get in touch with us to schedule a conversation. We would welcome the opportunity to learn more about your business and how we can help. 

 

Digital Hygiene Series:

Daniel Gilbert

Daniel Gilbert

Chief Operating Officer
Kite Technology Group

Digital Hygiene Series: Strategies for Organizing Your Digital Files

If you have any experience working with a horribly messy file cabinet room, you know how important it is to practice good hygiene when storing documents and other files. In this second article of our Digital Hygiene series, we’ll review five strategies for effective document and file storage to help you keep your digital file room clean. Taking the time to organize your digital documents and folders will go a long way in helping you be more efficient by making it much easier to find the files you need.

1. Use Cloud Storage

Using cloud storage puts your data in a place that is highly accessible to you and protected by a layer of backup. The most common services are Google, Dropbox, and KiteTech’s favorite, Microsoft’s OneDrive and Sharepoint. The important thing is not which service you are using, but that you are using one of the services, and using it properly. It is best to ensure that every single file you work with is saved on cloud storage, and that you are either using file sync or accessing the files directly in the web browser to work with them. This ensures that all your files are protected, and you avoid issues with file sync conflicts and duplicates.

2. Archive Unused Files

Data sets grow out of control if they are never cleaned out, so it is good practice to clean out unused files from your storage as soon as they become obsolete, or you don’t plan to work with them anymore. Doing this well requires regular auditing because it is easy to forget and ignore, and before you know it your useful data is buried among countless items you never even use. But archiving your data does not need to mean completely getting rid of it, it just means moving it out of the way of your useful data. Think about your data in two different buckets, your working data set which contains all the data you currently use, and your archive which is just long-term storage for files you no longer use. Keep in mind it is important to keep your archive just as well-organized as your working data set.

3. Archive Large Files

Without proper management, data storage can grow very large very quickly. To combat this, audit your files regularly for particularly large files that you don’t need. You can either use the Size fields available in your Windows Explorer or Finder window, or else use a tool like TreeSize to help you find the files and folders taking up the most space. Reducing the size of your working data set will help you reduce your download times, avoid hitting storage limits based on the service you use, or avoid paying more for storage space you don’t need.

4. Use Folder/File Naming Conventions

You want your files to be easy for you to browse. I advise using naming conventions to keep your files and folders standardized. When you are looking at a set of data that has consistency in its naming, you tend to have an easier time finding what you are looking for. Some examples of naming conventions you could use are sequential patterns (maybe you use a consistent year-month-title format), use of special characters (like hyphens or underscores for formatting), and consistent capitalization (maybe you capitalize all the letters in acronyms or abbreviations, or you use camel case for phrases like “MyFileName”). If I were employing these naming conventions when storing this article, it would be named “2022-July-DigitalHygiene.docx”. Of course, it is important to use the same naming conventions across all your files to ensure the best searchability.

5. Serialize File Names

Another way to use your file and folder names to make your data easy to navigate is to use serialization. This is when you use letters and numbers to add prefixes or suffixes to your file names so that they sort in a particular order alphabetically. This method is commonly used when many of the same kind of files are saved together and need to have distinct names. Some examples include adding a number to the end of a file name (“JulyArticle01”, “JulyArticle02”, “JulyArticle03”, etc.) or adding the date (“20220701_Article”, “20220714_Article”, “20220716_Article”, etc.). Use file name serialization in as many places as necessary in your data to make your data as easy to navigate as possible.

Conclusion

By following these five strategies, you’ll be more successful at keeping all your documents organized and easily accessible. To learn more about virtual organization and best practices, stay tuned for our next article in our digital hygiene series: Decluttering Your Inbox for Greater Productivity.

If you are not currently working with us and would like to learn more about Kite Technology’s IT and Consulting Services, please get in touch with us to schedule a conversation. We would welcome the opportunity to learn more about your business and how we can help. 
 

Digital Hygiene Series:

Daniel Gilbert

Daniel Gilbert

Chief Operating Officer
Kite Technology Group

Digital Hygiene Series: Tips for Optimizing Your Computer’s Performance

We all love working on a brand-new computer because it is fast and responsive. However, over time, our new computers seem to slow down until they eventually become difficult and frustrating to use effectively. In this first article of our Digital Hygiene Series, we’ll share steps that you can take to slow down your computer’s degradation which will in turn improve its performance and your user experience.

1. Remove Unused Applications

Over time we install applications on our computers we need for one reason or another, and then we often forget we installed them. After a while, we end up with many applications we never use. It is easy to forget about these because we no longer see them. However, they are still taking up computer storage and potentially processing power, so removing unused applications is vital. It’s essential to take the time to audit your applications list regularly to make sure you have only the apps you need and use. Immediately uninstall applications when you no longer need them to keep your applications list as short as possible and reduce the amount of computer storage used.

2. Disable Startup Programs

Some programs installed on your computer have components that automatically run when you start your computer and continue to run the entire time, and you may not even realize it. Even though a program is installed because you still use it occasionally, you may have no reason to have those components run at startup. So, it is worth considering which of your startup programs you can disable to reduce your computer’s load at startup. To access your startup programs, open Task Manager and go to the Startup tab. Here, you can see which programs are enabled at startup and choose which ones to disable by right-clicking them and clicking “Disable”. You should become familiar with all the items in your Startup tab, so research any that you don’t recognize immediately to decide whether it needs to stay enabled at startup.

3. Reboot Frequently

This one is pretty simple: Generally speaking, the longer your computer goes without rebooting, the slower it becomes over time. If you have ever worked on a computer that hasn’t rebooted in weeks or even months, you can probably observe a considerable improvement from a single reboot. It is certainly best to reboot your computer once a day. I typically recommend rebooting when you finish the day so you can start work the next day on a fresh boot. Rebooting your computer at the end of the workday instead of the beginning allows you to promptly begin work each day without waiting for a reboot. You’ll also be less tempted to skip the reboot because of feeling rushed to get started working right away.

4. Keep Up with System Updates

System updates are released monthly at the very least and often more frequently, especially patches for security vulnerabilities. It is best to install updates as soon as possible after they become available and have been reasonably tested to ensure they don’t cause instabilities. Both Windows and macOS offer the ability to automatically check for and install updates, which is better than having to remember to go in and check manually every so often. The worst thing you can do is ignore the need for system updates because your computer will likely slow down, could lose functionality, and you may risk exposing yourself to serious security vulnerabilities. It is also essential to ensure you are not only updating your operating system but also your BIOS and firmware. If you are part of an organization, your administrator should have a process for regularly deploying system updates across all computers.

5. Keep Up with Third-Party Updates

Third-party updates refer to any updates for applications and drivers you have installed on your computer. Some programs may require that you check for updates manually, but most programs have an automatic update process just like your system updates. Often you will see programs show a notification in the system tray alerting you that an update is ready to be installed. Like system updates, you should install third-party updates quickly once they have been reasonably tested. If you are part of an organization, third-party updates should be handled by a process run by your administrator.

Conclusion

If you are experiencing slow computer performance, implementing these practices more consistently will help it run more efficiently and help you enjoy an overall better experience.
 
One word of caution is to make sure to double check that there isn’t malware or a virus causing lags or poor performance. If you are already implementing these strategies consistently but still experiencing lags or slow speeds, you should look into what else might be causing these issues. If you’re working with Kite Technology, contact our IT Help Desk to get some help! 
 
If you are not currently working with us and would like to learn more about Kite Technology’s IT and Consulting Services, please get in touch with us to schedule a conversation. We would welcome the opportunity to learn more about your business and how we can help. 
 

Digital Hygiene Series:

Daniel Gilbert

Daniel Gilbert

Chief Operating Officer
Kite Technology Group

adam atwell

Adam Atwell

Cloud solutions architect

Adam is passionate about consulting with organizations across the country to help them develop and execute a cloud adoption strategy that meets their business needs and future objectives. Adam oversees and manages our company strategy for Microsoft 365 adoption and is responsible for future growth and development inside Microsoft 365 and other cloud technologies.