Apps: Security

Cyber Security: Twelve Online Behaviors That Put You at Risk

Cyber Security In 7 Minutes | What Is Cyber Security: How It Works? | Cyber Security [Video]

Video uploaded by Simplilearn on June 10, 2020

12 Online Behaviors That Sabotage Your Cyber Security

Even experienced web surfers are prone to overlook online security. Most of them think they are too insignificant to fall victim to hackers or web stalkers, but they’re wrong. Cyber criminals use robots that suck in data from millions of users, regardless of income, social class, or personal preferences.

So here’s our list of bad online habits you should ditch for greater safety:

1. Using the Same Password

Don’t use the same password on different websites.

Never use the same password for computers, phones, tablets, forums, online stores, and social media accounts, even if it’s 18 symbols long and contains letters and digits. If one of your accounts is cracked, then every single one of them is spawned.

Some users have three passwords: one for all the devices, one for shopping, and one for chats or social media. It’s ultimately wrong.

Use password generators and managers to create and store all your passcodes.

One device/account should equal one password. Think of it as a driving license: you can’t share it with other people, can you?

2. No-Password PC or Laptop Waking

You need a password to access your computer when you start it, but what about after waking it from hibernation? Apply the smartphone principle to your computer—your computer or laptop should ask for a password every time you wake it. No exceptions!

3. Adding Other Peoples’ Fingerprints

Don’t add other peoples’ fingerprints.

Thank God phone makers and OS developers require users to use a passcode to activate their devices, be it a password, a draw-based graphical password, or some biometric ID. The most common biometric ID is a fingerprint. MobileSoft allows adding up to five fingerprints to a database. It can sense an emergency situation, like if you cut or fractured your identification finger and used another finger. However, many people also add fingerprints of their partners, spouses, and even kids. Never do that! Use alternative means of identification, like passcodes and graphic keys.

4. Using Z as a Draw-Based Graphical Password

Try to avoid Z or mirrored Z as a draw-based graphical password. It’s the easiest draw pattern, but also the most common.

5. Skipping Two-Step Authentication

2FA is the most secure access to private files and emails. Leading account-based services, including Gmail, Google Drive, iCloud, Twitter, and Facebook, insist on two-factor authentication, and randomly check phone numbers to add an extra layer of protection. Be patient, and wait for a passcode text to be sent to your phone!

6. No Lock Screen Protection

Always lock your phone, tablet, or PC screen and turn off notifications on the lock screen.

Always lock your phone, tablet, or PC screen and turn off notifications on the lock screen. Other people should see just wallpapers. Locking the screen or sending a laptop into hibernation mode should become an automatic routine, like locking your car or house when you leave.

6. Turning Off Anti-Virus Updates

Many nonchalant users turn off antivirus updates because they lack free disk space or memory. You can delete any other software and save your files to an external drive to save space, but ALWAYS let your AV update its database, because unprotected data is everyone’s data.

7. Ignoring System Checkup Routines

Every decent antivirus offers a regular system check-up by default. Unfortunately, these routines slow down a PC’s overall performance, which is why many users turn them off. Users rely on AV background monitoring and hope that the software will alert them if it detects suspicious activity. Activity is the key word here. If malware is active, it means the computer was infested, and data may have leaked or become corrupted.

Schedule a regular checkup for nighttime, or a time when you’re away from your PC.

8. Having Too Many Browser Extensions

Browser extensions are numerous and ubiquitous. Some come by default with a browser. They are advertised as helpful softwares, but they mostly slow down your web surfing speed and can act as worms or backdoors. Sit down and count how many browser extensions you use more or less regularly. We bet it will be two or three, at most. Turn the others off or uninstall them and run an AV system checkup.

9. Clicking on Strange-Looking Links in Emails or Messages From Unknown Senders

Clicking on a strange-looking link is like opening Pandora’s box.

Clicking on a strange-looking link is like opening Pandora’s box. Pandora was a very curious ancient Greek goddess who was told never to open a box that Zeus gave her. She disobeyed and unleashed maladies, disasters, and death. Don’t be like Pandora! A single long link without a preview should alert you. If it happens to come from one of your contacts, reach out to them and ask what it means. A spoofed account never answers.

10. Using Pre-installed Factory Passwords for Routers and Other Connected Smart Devices

Never use a password from a sticker on your router or from a connected smart device. Factory databases are always under attack, and they leak. When activating a device for the first time, the first thing you should do is change the default password.

11. Using Public Wi-Fi For Access to Cloud and Bank Accounts

If you’re connected to a public hotspot, refrain from visiting your online bank accounts or cloud storages. One in four public hotspots have no protection at all; the other three have minimum protection. If you absolutely need to check your bank account or email, use a VPN.

If you can avoid these twelve pitfalls, your surfing should be much more secure.

Links

Share
Published by
Steve

Recent Posts

Scams on WhatsApp: Cybercriminals Impersonate the Voices

Thousands of Scams on WhatsApp: They Impersonate the Voices of Your Parents and Best Friends,…

2 weeks ago

Credential Stuffing: Increasingly Devastating in France

Credential Stuffing: Increasingly Devastating in France This formidable technique explains the surge in cyberattacks in…

3 weeks ago

Users Report Hearing Strange Voices on Their iPhones

Mysterious Case: Users Report Hearing Strange Voices on Their iPhones Affected phones may have privacy…

1 month ago

Xiaomi Announced Poco C75 Mid-range Smartphone

Xiaomi Announced Poco C75 Mid-range Smartphone The Poco C75 is a newly announced mid-range smartphone…

1 month ago

Meta Tests to Implement Facial Recognition Technology

Meta Conducts Tests to Implement Facial Recognition Technology Meta, the company behind social media platforms…

2 months ago

The Best Apple Intelligence Features in iOS 18.1

The 5 Best Apple Intelligence Features You Can Try in iOS 18.1: Experience Apple Intelligence…

2 months ago