Non-Negotiables: 10 Taboos for IT Professionals

I have been working in the IT industry for over 30 years, specializing in security as an editor at PC-WELT, PCWorld’s German sister publication. My expertise includes testing antivirus software, providing tips on enhancing Windows security, scouting for top security tools, and monitoring cyber criminal activities. Through my experience, I have developed a set of behaviors and principles that prioritize data security. When observing other PC users, I often notice risky or less security-oriented behavior. Here are 10 things I, as an IT security expert, would never do:

1. Moving instead of copying files: Avoid moving unique files like photos or videos from your camera or smartphone as it increases the risk of data loss. Always copy important files before removing them from their original location.

2. Not backing up data: Set up automatic backups for all important data to prevent loss in case of system failures or errors. Make sure to back up files created using apps on devices like iPads or smartphones, as data loss can occur unexpectedly.

3. Formatting without a thorough check: Before formatting a storage drive, ensure that you have selected the correct drive to avoid accidental data loss. Always double-check the drive letter, name, and size to avoid formatting the wrong drive.

4. Opening links in emails: Avoid opening links in emails, especially if they claim to be from banks or payment service providers. Instead, access important websites through saved links or by typing the address directly into the browser to verify authenticity.

5. Opening suspicious files: Refrain from opening or starting suspicious files, whether they are programs or documents. Check files with a virus scanner or services like virustotal.com to ensure they are safe before accessing them.

6. Providing vouchers for payment: Be cautious when asked to purchase vouchers for services, as this could be a scam. Social engineering attacks manipulate individuals using psychological tactics, exploiting trust, fear, or ignorance to obtain money or personal information.

By following these practices, you can enhance your data security and protect yourself from potential threats in the digital world.