Cybersecurity Basics: Simple Habits to Stay Safe Online

We have all been affected by the internet. Most of us use internet based tools (social media, shopping, banking etc.) on a regular basis. While this is incredibly convenient it does come with some risks. Millions of people are victims of cybercrime every year.

Fortunately most of these risks can be avoided through the use of simple common sense. Some of the things you can do will involve a little practice but they can greatly increase your security and decrease the risk of being attacked by hackers.

In this article we’ll look at some of the simplest ways to maintain good cybersecurity habits when using the internet.

Use Strong and Unique Passwords

One of the biggest and most well-known security risks is the use of poor or repeated passwords when accessing many sites. The more passwords that can be guessed by an attacker, or if they are used in many places, the greater the risk of your personal data being accessed.

To have a good password you need it to be long and combine letters, numbers and symbols; you should never include something you could easily remember, like your birthday, name, etc., or just a series of number (e.g. “123456”).

In addition to having a good password, you should also have a unique password for every site you access. If one site has its user database breached, hackers will try all the passwords from that database on other sites. With a unique password for every site, you will protect yourself against this ‘domino effect’.

Many users choose to utilize password managers. Password managers are applications specifically created to securely save and create safe passwords.

Enable Two-Factor Authentication

Two-Factor Authentication (2FA) adds another level of security to account(s). As opposed to relying on only your password for access, you are required to enter a second level of verification prior to logging into your account.

The second verification level could be to enter a numeric code that was previously sent via SMS/Email, verify a login request via an authentication App, or use biometric verification such as fingerprints. If someone were able to obtain your password, they would require access to the second factor of verification to successfully gain access to your account; therefore, enabling two-factor authentication is generally considered the best way to secure all of your online accounts.

Be Careful With Suspicious Emails

Phishing Emails Remain One of Most Popular Methods Cyber Attackers Use to Target Internet Users. A number of hackers send email scams that use deception to obtain personally identifiable information or have individuals click on potentially harmful links.

Phishing emails can be disguised as legitimate communications from companies, banks or other well-known online service providers. The primary goal of these communications is to collect an individual’s login credentials, banking information, or other forms of personally identifiable information.

When an individual receives an email that they did not expect, it is very helpful to review the sender to ensure that the email is coming from a trustworthy source before attempting to open or download anything that you do not recognize as safe. It is always best to verify requests that create a sense of urgency or request your sensitive information by contacting the organization involved.

Keep Your Software Updated

Software updates are not just about new capabilities. Many times, an update addresses a vulnerability that has been discovered by hackers who have taken advantage of it to cause harm to individuals or companies.

Many operating systems (Windows), Web Browsers (Internet Explorer, Firefox) and Applications (Microsoft Office, Adobe Acrobat) need to be updated as they contain known vulnerabilities that could allow hackers to take control of your device if you do not update them when available. Many devices today will automatically update, so you will not have to manually search for newer versions of the software on your device.

If you continue to ignore these updates for an extended period, you may expose your device to known vulnerabilities.

Avoid Public Wi-Fi for Sensitive Activities

Using a public Wi-Fi network (for example, at an airport, hotel or café) provides a convenience for you, however, this same public network is typically less secure than your connection from the privacy of your own home.

If you use public Wi-FI then you may be subject to hackers attempting to intercept your data being transmitted on the public network which could lead to hackers obtaining your login credentials and/or your personal information.

When using public Wi-Fi it is best to refrain from engaging in any activity that would require you to enter or transmit sensitive information (such as online banking or typing in passwords). If you have to engage in some type of sensitive transaction while on public Wi-FI, consider securing your transaction with a VPN (Virtual Private Network), as a Virtual Private Network will provide you with additional security.

Limit the Personal Information You Share Online

Another key area in the field of cyber-security is limiting the amount of personal data that you share with others when using the Internet. A lot of times social media sites, blogs, discussion boards, and on-line forms will ask you for a variety of personal information.

The more you give them the less secure your password is. The less secure your password is the easier it is for someone to be able to use your password, answer your security questions, or develop a scam targeted at you.

Limiting the personal data you put out on the web will help prevent identity theft, as well as other types of social engineering attacks.

Use Temporary Emails When Appropriate

Websites frequently request e-mail addresses in order to allow access to content, download files or create accounts. While this is often required, the provision of an e-mail address may result in unwanted emails, advertisements or even expose you to possible privacy threats.

Utilizing a temporary email service (like Evap Mail) may be used to lessen some of these issues. A temporary email address will enable users to receive verification messages or confirmation links but does not expose your personal e-mail address account.

Using temporary email addresses will assist in keeping your primary inbox free from spam as well as protect your actual e-mail address from being distributed to numerous other websites.

Temporary email addresses are most beneficial for single registration processes, testing services, or for receiving verification of content through rapid email verification.

Think Before You Click

One of the most simple yet most useful cybersecurity practices is to be cautious when using online. Most cyber-attacks are based on making users click on something in an emergency situation before they have time to think about what they are doing.

Always take a second to verify who you are getting information from before clicking on a link, downloading a file, or providing login credentials. A few seconds could save you a lot of trouble.

Technology is just one part of cybersecurity. The other parts include being aware of how to use online responsibly.

Final Thoughts

The Internet is an opportunity for great things however there are many dangers on the internet that require people to be aware of the dangers that exist. It does not take sophisticated tools or expert knowledge to be safe on the Internet. Many times simple habits will go a long way to keep your personal data and online accounts safe.

Strong passwords, two-factor authentication, recognizing suspicious emails, updating software and being cautious about what you provide to others through the internet, will all aid in a safer online experience.

Also, temporary email services like Evap Mail may help protect privacy when using a website requiring email verification.

By implementing basic cybersecurity habits, individuals will be able to minimize their risk and use the Internet more safely.