
The number of cyber-attacks over the years has and continues to increase, which is why it’s so important you have at least some idea of how to protect yourself online. There’s nothing you can do that will secure your system 100%, but there are things you can do to mitigate risk.
1. Back Up Your Data
You should back up all sensitive data on all your devices. This means, having at least duplicate copies of all your information on an external storage device. If you are unfortunate enough to be attacked by a cybercriminal, it is possible that you may no longer be able to access your data. Which is why it’s so important that you have backups. As you’ll be able to regain all that you have lost, irrespective of the situation you find yourself in.
So, what options do you have available to you? Well, you can either, invest in an external storage device, and use that to backup all your data, on a daily or weekly basis, or you can use the cloud. Just sign up to one of the many cloud services, and start from there.
2. Use Unique Passwords
If you’ve been on the internet for any real length of time, then you’d likely have built up a significant portfolio of online accounts. The downside to this, is all the different passwords you inevitably have to keep track of. To make life easier, a lot of people make the mistake of using the same password across many accounts and services, or they have two or three passwords that they reuse over and over. The main issue with this, is that, if an attacker was able to gain access to one of your accounts, then they’d be able to access your other accounts using the same login credentials.
So what can you do? Use unique passwords across all your accounts and services you’ve signed up to.
You should also consider investing in a password manager, as they can be used to store and manage all your passwords. Essentially, all you’ll need to remember, is the password you use to log into your password manager tool.
You should also consider using passphrases, which could be made up of short phrases or random words, which you piece together. Passphrases have proven to be much stronger, and much easier for the user to remember
You could go with a complex password, which would consist of numbers, letters, symbols, and special characters (if supported).
Go through all the different accounts and passwords used on them, and consider changing (or strengthening) the passwords for those accounts that you’ve had the longest.
3. Use Internet Security Software
When it comes to fighting malicious threats, such as virus files, adware, worms etc. then antivirus scanners should come to mind, for most people. Antivirus scanners are designed to block malware and other forms of malicious threats from infiltrating your system and corrupting your data. When choosing the right scanner to go with, it’s always best to stick with those from the most trusted vendors – and never have more than one antivirus scanner on your system.
Having a firewall is also equally as important, as they too will also protect your computer from cybercriminals. Where they differ is in how they do that. Your firewall will protect your system from hackers gaining unauthorised control over your system. They will also filter your traffic, determining what comes and goes into your system. Both Mac and Windows based systems come with their own firewall tools, named Mac Firewall and Windows Firewall. Most routers today also have built-in firewall capabilities as well.
4. Use Multi-Factor Authentication (MFA)
Multi-factor authentication is a security services that adds an additional layer of security to your typical sign in method of username and password. You’re usual log in process involves typing in your username and password then clicking on OK, however with multi-factor authentication, the end user is prompted to add another authentication method, which could be a passcode sent to your email account or mobile phone. It could also be a biometric scan or fingerprint. Depending on whether you have two-factor or multi-factor authentication, you could be asked to add several authentication methods to gain access to an account.
Recent studies have shown that your mobile phone is the least secure security layer. So you may want to consider using your email account or a fingerprint, or anything else down that line, to help you.
5. Avoid Any Sensitive Activity on Public Wi-Fi
It’s very important that you act with caution when accessing the internet through a public hotspot – like, if you were accessing the internet through a McDonald’s router. This is because the level of security in these networks are minimal. These networks are designed for easy access, meaning, anyone can log into them, and in some instances, access the data from others connected to it. Shoulder surfing, is another thing you’re also at risk of. This is when an individual looks over your shoulder to try and see what you’re typing, when accessing your accounts. Given the risks, that doesn’t mean you should rule out using free internet altogether. There are things you can do, safely while on a public hotspot, like checking the weather or the latest news.
So, what should you do? Avoid logging into your bank account while on an unsecure network.
If you must log into your email account, then make sure it has multi-factor authentication enabled.
Make sure you’re logging into your accounts on your own device, instead of someone else’s.
6. Phishing Scams
You should always be wary of any phone calls, emails or flyers that you receive. During a phishing scam attempt, the cybercriminal will try to disguise themselves as someone legitimate. When in actuality, they are trying to obtain sensitive information about you. Such as your IP address, username, personal name, phone number, social security number, home address and the like. All of this information is then compiled and used for things, such as identity fraud.
7. Check Your Bank Statements
Make sure you’re always checking your bank statements – for any unusual spending. Make sure you have a heads up of what’s going in and coming out of your account.
If you see anything you can’t account for, then you must contact your bank as soon as possible. Seeing funds being transferred into your account, or any unexpected charges on your statements, are all signs that someone else may already have access to your account or credit card data.
So, what should you do? As I said before, keep track of what’s going in and out – which can be done, via your bank statements.
Phone your bank, whenever you see any activity (on your account(s)) that you cannot account for.
—AUTHOR INFO—
Uchenna Ani-Okoye is a former IT Manager who now runs his own computer support website https://www.compuchenna.co.uk.