Protect Online Privacy: How To Stay Safe Online
Summary: This concise article explores the many common mistakes users make while online and how they can compromise cyber security. If you need help, contact GEEK-AID Computer and Network Support at https://www.geekaid.com/ for home or business computer training.
Today, there are more than 5 billion internet users worldwide, and it is estimated that 85 percent of Americans log on every day. As with most of our daily routines, we can get sloppy and complacent about their execution over time. Shortcuts and impatience can cause users to make mistakes, and in the world of online security, those mistakes can lead to cyberattacks.
Security online is not just about installing antivirus software. There is no single set-and-forget option to protect your data from all cyber threats. Robust cyber security requires many layers to secure your private data and protect your computer and network. Fortunately, the most common bad habits can be identified and improved.
Computer Safety Tips
- Using Weak Passwords – There is no excuse for anyone who has used computers for a while to choose weak passwords. The days of using your pet’s name, your birthday or your anniversary as a password are long gone. Using strong, unique, multi-character passwords is the first layer of defense against cyberattacks. Strong passwords should include upper and lower case letters, numbers and special characters. They should not be related to you in any way. The rule of thumb is that the weaker the password, the more likely you will get hacked. If you are confused about creating and storing passwords, you should consider installing a password manager. In fact, everyone should use one.
- Password managers can generate very strong passwords and securely store them for you. Quality password managers eliminate the need to worry about where you wrote down a password and what you did with that piece of paper. For the record, writing passwords down on paper is a terrible idea. How many times have you grabbed a piece of paper to write something down and then can’t find it? Just because you can’t find it doesn’t mean that someone else won’t.
- Sharing Your Devices – You might have complete trust in the friend or coworker with whom you share your computer devices. But even if they can be trusted not to intentionally compromise your computer or data, that doesn’t mean they couldn’t accidentally open you to a cyberattack. For example, if they check their email through your machine, they might impulsively click on a malicious link embedded in one of their emails. Not everyone uses the same best practices when using computers; therefore, it is best to refrain from sharing devices.
- Reviewing Emails Without Considering Cyber Security – Rushing through your emails and impulsively clicking on links and attachments is a recipe for disaster. Users must be hypervigilant about inspecting domain names, email addresses and other identifying factors included in emails to ensure they are from a trusted source. Hackers count on users being unconscious of their cyber vulnerabilities. Think before you click because one wrong click can launch a cyberattack. Enough said.
- Leaving Devices On All The Time – When devices are left on all the time, they are open to various attacks through your network or Bluetooth connections. By never shutting them down, you decrease the lifespan of your devices and leave them open to attacks running in the background without your knowledge. Shut down when you are done for the day. You and your computers will sleep better.
- Using Public USB Charging Stations – Charging your phone at a public USB port might be convenient. However, a public port can damage your device due to power issues, and if a cybercriminal compromises the port, they can take control of your device, breach your data and attack your network.
- Doing Personal Work on Business Devices – Many businesses have suffered data breaches from employees breaking business internet security protocols and performing personal activities on company computers. Keep business and personal computer work separate, meaning separate devices and separate networks.
- Installing Bad Software – Downloading software from unknown sources is dangerous. Cyberthieves create facades for “Free Software” and, in doing so, lure users into downloading their malicious software. Stick to reputable app stores and vendors; if you aren’t sure about a software app’s authenticity, don’t download it.
- Forgetting to Use Your VPN – Although business internet security platforms emphasize the importance of using VPNs when working remotely, surprisingly, few users activate them. Ironically, even if the VPNs are pre-installed, most users are not diligent about logging on to the internet through them. VPNs use tunneling technology to create a network within your network. Next, they encrypt your data and transmit it via a different IP address that could be anywhere in the world. For example, you might be working on your laptop, waiting for a plane, but a cybercriminal attempting to breach your network and steal your data sees your IP address pinging in Bulgaria. VPNs make you almost invisible to hackers trying to breach your online activities. Even if they manage to grab your data, its encryption will turn it into computer gibberish.
- Not Updating Software – Keeping software up to date is a straightforward task. You can even set it up to occur automatically. However, many users are lazy or forgetful about updating all their software. The problem with that approach is that they are missing out on security updates (fixes or patches) developers have created to tighten up their product’s cyber security. Furthermore, the updates are free, so why not install them?
By following our online computer safety tips, you will take a big step toward securing all your Internet activities.