Skip to main content

HOW to STAY SAFE ONLINE!



A 19-year-old running for public office in New Hampshire found out about the importance of following Internet safety rules the hard way. As Seacoast Online reports, his opponents found images in his social media posts that were sexually suggestive and referenced past drug use. Just like that, his political career crashed and burned upon takeoff. But, unfortunately, he isn't the only one, as careless Internet habits have left others exposed to scams, identity theft and physical harm at the hands of people they met online. With more users accessing the Internet through mobile devices, these risks are changing and growing quickly.

Even though apps loom larger in most people's daily online interactions than traditional websites do, that does not mean that the basic Internet safety rules have changed. Hackers are still on the lookout for personal information they can use to access your credit card and bank information.

Unsafe surfing can also lead to other threats—from embarrassing personal comments or images that, once online, are nearly impossible to erase, to getting mixed up with people you'd rather have had nothing to do with.

It’s no secret that the internet is home to some shady characters, but staying safe online doesn’t require you to turn your internet off. Instead, stay mindful and take a look at these 10 easy tips for online safety:


  1. Don’t share personal info.
  2. Double-check and verify links.
  3. Use secure public Wi-Fi.
  4. Use a VPN.
  5. Only log into sites that start with https://.
  6. Be careful who you chat with.
  7. Turn off your Bluetooth.
  8. Use antivirus software.
  9. Use secure passwords.
  10. Backup your data.


1. Don’t share your personal information

It goes without saying that you should never share your passwords, banking information, or address online. But other information, like details about your relationship, could be used to figure out answers to your security questions or even give hackers a tip-off when it comes to guessing your password.

2. Double-check any links before you click

When checking your email or visiting websites, make sure you know and trust any links before you click on them.

One way to tell if a link is safe is to mouse over it. This will show a preview of the full link in your web browser’s status bar. Check to make sure the preview link matches the site it should be from—you can verify the correct site link by googling the company name.

For example, if you get an email from Wells Fargo bank and the link preview shows “www.wells-fargo-bank.com,” it doesn’t match the correct site link that comes up in Google: “www.wellsfargo.com.”

3. Use secure public Wi-Fi networks

You should never use an unsecured (unlocked with no password) public Wi-Fi network unless you absolutely have to. And if you do use one, avoid logging into any of your accounts online or on apps or entering in any personal or financial information.

Hackers are known to set up fake Wi-Fi hotspots to lure unsuspecting web surfers in. Once someone logs into the fake Wi-Fi, the hacker can see basically everything they do online. Scary.

If you’re out on the town and looking for a Wi-Fi connection, it’s safest to ask a barista or employee what the name of their Wi-Fi network is. And if the password isn’t posted where you can see it, make sure you get that info too.

4. Use a VPN with your Wi-Fi connection

A VPN, or virtual private network, securely connects your device to an internet server so that no one can monitor your activity or access your data through your internet connection. It’s a great (and legal) way to keep your connection secure at home and even while you’re out and about using public Wi-Fi.

The only downside to the increased security a VPN provides? It could slow your internet connection. This is because the VPN routes your info through another server to secure your data. You win some, you lose some, we guess.

5. Only log into sites that start with https://


Getting ready to online shop? Or maybe you need to see your checking account balance. If you’re about to log into any site, make sure the address at the top of your web browser starts with https:// and not http://. You may also see a padlock symbol next to the site address.

The “S” stands for “secure,” and it means the site is encrypting your data.

6. Be careful who you and your children talk to

Cyberbullying, threats, and harassment are very real online issues. We recommend being choosy about who you talk to and engage with online. And if they cross the line, document the issue and hit that block button. No one deserves to be treated that way.

Children and teens may be cyberbullied by their peers, leaving them in a rough spot because they personally know the people involved. That’s why it’s important for you to get involved in what your kids are doing online and make sure they know what to do in case they’re bullied online.

7. Turn your Bluetooth off


A team of researchers found that Bluetooth communications can be compromised and even manipulated.1 They were able to exploit a vulnerability in a Bluetooth connection, then listen to and change the content of nearby Bluetooth communications.

That’s not to say you should never use your Bluetooth. But if you’re not paired to another device and actively using it, it’s best to turn it off. You might even save some of your phone’s battery by doing that.

8. Use antivirus and antimalware software

You should never surf the web without protection in place. Even if you’re on a budget, you can find free and low-cost antivirus software.

Whatever the case, paying a little out of pocket for the software is worth it to avoid the headache of dealing with malware—or worse. And if you already have an antivirus or antimalware software installed, make sure you keep it up to date.

Some recommended antivirus and antimalware software includes the following:
Norton AntiVirus Plus
Bitdefender
AVG
Malwarebytes
Avast
SpyBot Search and Destroy

9. Create and use complex passwords

Yup, we’re gonna beat that drum: you should always use complex passwords. And if your password is listed in the top 200 commonly used passwords (or if it’s similar to any of these, to be honest), you should change it. Now.

If you need some help coming up with a secure password, here are some tips:
Make it at least 15 characters long—longer, if possible.
Mix up letters (both lowercase and uppercase), numbers, and symbols.
Don’t use sequences of numbers or letters, like “qwerty.”
Avoid substitutions like leetspeak (where letters are replaced with similar-looking numbers and symbols).

10. Backup your data


Most Macs and PCs have an option to let you backup your data, and it’s worthwhile taking the time to do it every so often. Data backups can be a lifesaver if your computer gets infected with a virus: you should be able to restore your computer to its original state before it got infected.



Source: 

Comments

Popular posts from this blog

The “I” and “My” by George Herbert Mead: A Reflective Essay by: Lourenzo Manimtim

            The “I” and “Me” and the Generalized others, of George Herbert Mead, focuses on the effects of the significant others in the development of our perception of the self. In contrast to the study of Charles Cooley, where he believed that the other people are the ones that play a significant role on how we view our selves. Mead instead focused on the significant others, the significant people that may influence to our perception of the self and how those people thoughts of us changes across the lifespan. The special people which Mead refers are the closest people to us, most especially our family, relatives, peers and even your loved one. Mead’s theory highlights the effect of the significant others, their influence in our life to what they expect us to become. In this theory of the social self, we will understand the views, thoughts and expectations of society had of us and how it affects the development of our self. “I” is the individual identity of a person and our pers

THE PHILOSOPHY OF THE FILIPINO DEMOCRACY | By: Lourenzo Manimtim

  THE PHILOSOPHY OF THE FILIPINO DEMOCRACY   By: Lourenzo Manimtim The state of the nation depends on states of citizens, and a nation is governed by leaders and the leaders are elected by the citizens. It is not a very big surprise to see usual the political situation of the Philippines, shown in the media are the rampant cases of corruption, incompetence of leaders, violence, and greed.   Most politicians operate by their own interests, primarily the traditional politicians, the large and corrupt big political families that rule the power and government in our country. And many of these families are fat dynasties, with their greed of power and wealth they leech and drain the country of its resources. But aside from the fat dynasties, there also other ordinary politicians that use their power for their own interests. But amidst the current situation we cannot take for granted that there are also good politicians that loyally serves and loves their country and the society.   But if

Is Taiwan a State? | Reflection Paper by Lourenzo Manimtim

  Is Taiwan a State? A Reflection Paper by Lourenzo Manimtim   The island of Taiwan officially known as the Republic of China (ROC) is a  country  in  East Asia , at the junction of the  East  and  South China Seas  in the northwestern  Pacific Ocean , with the People's Republic of China (PRC) to the northwest,   Japan  to the northeast, and the  Philippines  to the south. The  territories controlled by the ROC  consist of  168 islands with a combined area of 36,193 square kilometers (13,974 sq mi). In world politics, Taiwan is a highly controversial and a heavily disputed country with both of which the Republic of China (Taiwan) and the People’s Republic of China (Mainland China), claims Taiwan to be their territorial right and adheres to the implementation and unification of China through the One-China Policy, where both countries claims that the unified China is their own rights. The People’s Republic of China views Taiwan as an inseparable entity and important part o