You can find an article on how to properly protect yourself on the Internet in almost every quality media. However, personal experience is always the best. Therefore, I will write this article from my personal point of view, what has happened to me on the Internet and how I protect myself from data misuse. We bring you this article as part of Computer security day. Caution on the Internet is a daily part of everyone who comes into contact with it.
Safety on the Internet
Internet security is an increasingly important issue in today's world, as almost every person uses the Internet for various activities. From communicating with friends and family to shopping and banking, the Internet has become an integral part of our daily lives. However, as with everything, there are certain risks associated with using the Internet, and it is important to be aware of them and take steps to protect yourself and your information.
The main risks associated with using the Internet are:
identity theft
infecting your computer with malware and other malicious software
in addition to these risks, there are also potential dangers associated with online relationships
Basic tips for safe internet use
1. Passwords
It is necessary to create more complicated passwords than in the past, because the systems for breaking them are also improving. In the opening image, we can notice several passwords that are most commonly used in Slovakia. They are not strong enough and are easily broken. Thank you for this information Nord Pass.
When creating a password, it is important to follow certain rules:
it is very important what characters the passwords will consist of.
it is necessary to observe the length of the password, where it is recommended to fill it at least 10 cities
should consist of lowercase, uppercase letters, special characters and numbers.
Below in the picture we can see the speed of breaking individual passwords:
My own experience
When I started using the Internet, I also gave myself easy passwords. One day I received an email from an unnamed website that my password had been compromised. Fortunately, they used a system that did not allow changing the email until I confirmed the consent to the change. A couple of times someone tried to log into my Instagram and Facebook account. She saved me two-factor authentication and I immediately changed my passwords.
Final tips
I do not recommend using the "remember passwords" function. If someone hacks into this system, they will have all your data "on the table". Such a service is offered by, for example, various browsers, applications, Google or Apple. When you want or need to use it, secure it in several ways. Such as confirmation by application, backup code or code from SMS. This method is called two-factor authentication. Final advice. If you want to keep your passwords in your head, create your own your system to create different sequences that you can apply. It is the best way to protect your safety on the Internet. Have your own logic and do not reveal it to any person.
2 Phishing
The most common way to steal someone's data is "Phishing". The e-mail method is used the most, where the attacker camouflages the e-mail of one of the companies. They are mostly web links that look like login forms. If the user fills them in, the attacker obtained this data practically for free. Currently, SMS is also used. In it, the attacker sends and imitates the URL of the state website. Alternatively, it can also be in the form of threats or a request from the police. Police you that way NEVER will not address.
Lately, it happens to me that after publishing an ad, I receive an email or write an SMS saying that they would buy a product that I posted on an advertising portal. However, there is one catch. They send me a link with a link to the delivery company that they seem to have paid in advance for my goods. They ask me to fill in the card information and the money will be paid to me when the courier comes to collect it. Never do this. If someone is to pay you, they will never ask you for your card details.
zAlways check the given link even three times before opening them. These scam sites have different URLs. For example alza-cz.biz. You can already notice that it is not an original domain. It is located on alza.cz. You can see a good example of bazaar phishing messages on YouTube channels Guys from Prague.
3. Browsers and search engines
Choosing the right browser allows you to have detailed protection not only over with your data, but also above by the number of displayed and unwanted ads. Currently, almost all browsers are fast enough. Some are faster after one update, with the next one they will already be third in line. Therefore, do not focus only on its speed. Unfortunately, some also have to use traditional browsers such as Chrome, which supports advertising platforms. It is the most secure of the browsers Brave. It's fast and has a built-in VPN that you can use at any time. However, using it will limit the individual functions that websites can offer you. The decision is up to you. Search engines are an important means of security. One of the most famous is Google. However, you sacrifice a lot of important data that this company collects about you. On the other hand, from your web browsing history, it offers you relevant results from advertisements and there are more links than on competing search engines.
It is also making its way to the fore DuckDuckGo and I recommend it. It is necessary to test and try it for at least a week, and if it does not suit you, you can go back to the previous one. You don't need to be afraid of it, and maybe you yourself will be very surprised with its use.
4. Mobile devices
Around three-quarters of the world's smartphone users use a device with the Android operating system. The most frequently attackable system is this one. It is a "tax" for his openness and that's it 87% of all users may face at least one critical error. But how to avoid and prevent these threats?
It is important to install applications only from Play Store. Outside of this space, I do not recommend installing any applications that can steal not only data from your smartphone, but also data from a credit card. They know how to install malicious software without your knowledge.
Even the Play Store does not guarantee that your data will be in order. Google tries to check them and in most cases we get to safe apps, but this is not always the case. Install only verified applications. Hackers mainly try to attack older and not updated applications.
Use an antivirus program. There are several quality software on the market that will protect you. You should not forget to use them and check your smartphone regularly.
I no longer wanted to deal with everyday threats from Android traps. I have actively used smartphones on this platform. However, after being threatened by malware, I switched to competitors. Both Samsung and Google use hardware in their devices that protects data at the hardware level and remains in the smartphone.
5. VPN
You can protect your activity from the pitfalls of the Internet by using it Virtual Private Network, VPN for short. Especially with public WI-FI networks that you connect to via mobile devices. This applies equally to Android and iOS. Important protection should also be on laptops and desktop computers. Be sure not to log into a bank or other sensitive accounts on public Wi-Fi.
The advantage is, for example, anonymous browsing of your bank account and handling of finances. The downside, which also happened to me, is watching streaming platforms. For example, HBO did not support viewing from a country other than Slovakia. These VPN restrictions can occur to you with any service you regularly use.
There are a number of quality VPNs on the market. You have to look benefits or disadvantages each of them. Some use better encryption protocols, others use anonymous registration and Bitcoin payment. ExpressVPN has worked for me. It is more expensive, but we used it as part of our family account. We split the payment for using this service equally.
6. UPDATEAND USE AN ANTIVIRUS
Many users do not update their devices. These updates help you fight security threats and fix applications or entire systems. Kaspersky conducted research on 15 respondents who used a computer, tablet or smartphone for their work or personal life. Until 50% of users postpones its updates until later. 2% respondents answered that it does not update at all.
Find a day and write it in your diary when you can update your applications and systems on your devices. You can leave the updates for Sunday, when it is generally quiet and you usually have all your devices with you.
Don't underestimate either antivirus. In addition to phishing and malware, a Trojan horse can also get into your device. There are many antivirus programs on the market. You should read reviews and real experiences of other users, just like when choosing a VPN. These also need to be updated from time to time, unless you have requested automatic installations. Don't forget to set up a device scan, where you can also detect hidden threats.
Conclusion
Don't underestimate Be careful of what you share on social networks. Once you "hang" something on the net, you don't have to get rid of it. Communicate with a clear mind in the internet space so that you don't have to regret it later.
I have presented you with a short summary of what you should do regularly to protect your data and yourself on the Internet. There is certainly much more that could be written, but this is the very basics of what you should be doing on a regular basis. If you are interested in our blog, we also offer you other articles.
Do you want to start your project? Come along with us!
We offer free consultations to help guide your project.
Milan Cák
Founder & CEO
+421 917 552 947
milan.cak@amcef.com
Milan Cák
Founder & CEO
+421 917 552 947
milan.cak@amcef.com
Cookies
x
We use cookies on our website to provide you with the most relevant experience possible by remembering your preferences and repeat visits. By clicking the "I agree" button, you agree to the use of ALL cookies. However, you can visit “Cookie Settings” and provide controlled consent.
This website uses cookies to improve your experience while browsing the website. From them, cookies are stored in your browser, which are categorized as necessary, because they are necessary for the operation of basic functions.
Required cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo checkbox analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo checkbox functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-Necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies are used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-fastrs
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo checkbox performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not the user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedback, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which help in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics on the number of visitors, bounce rate, traffic source, etc.
Advertising cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Required cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo checkbox analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo checkbox functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-Necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies are used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-fastrs
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo checkbox performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not the user has consented to the use of cookies. It does not store any personal data.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functions and security features of the website in an anonymous form.
Cookie
Duration
Description
cookielawinfo checkbox analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo checkbox functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-Necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies are used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-fastrs
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo checkbox performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not the user has consented to the use of cookies. It does not store any personal data.