Just like you keep your guard up at other times, do the same while online.
According to the Global Risks Report, the World Economic Forum states that 95% of cybersecurity incidents are due to human error. Almost all applications, software, and social media platforms require you to create strong passwords. That is, it should not be a name, a regular “password”, or something that is easy to guess. Weak passwords are one of the main causes of personal information theft, where someone impersonates someone else.
Therefore, avoid creating passwords using personal data such as name, date of birth, etc. At the same time, make yourself recognizable so that others cannot. The longer the password, the better, so most platforms have the minimum character length. Also, avoid using the same password on multiple platforms. This keeps the other platform safe if one breaks.
Strong passwords are not the only guarantee of cybersecurity. You may see a lot of spam emails in your inbox. Be very careful when opening attachments such as emails and fish. B. Offer to enroll in money, work, or study. Although they look harmless, they are one of the best tools cybercriminals use to extract personal information to take advantage of their financial benefits. It may also be a trick to install malware on your system. This can be a virus that destroys your system, data and software corruption, or ransomware that blocks access to your device until you pay the ransom. Therefore, be aware of some obvious mistakes, spelling mistakes, or some aspects that look too good to be true. Be aware of phishing websites that can spoof some legitimate websites. Take a closer look at the URL and pay attention to the domain name and the security of your site. For example, avoid using the “HTTP” protocol for activities such as banking and financial transactions.
As smartphone usage has increased, smartphones have become another target for cyber attackers. You’ll have to follow the cybersecurity steps above, but here’s one more thing. Look at your phone, what is it filled with? The answer is an application or app that could be another tool in the hands of an attacker. This may be because some of them may be malware apps.
One of the most used is Joker malware that targets and uses SMS services. You can track clicks and trick users into subscribing to unwanted services for a fee. First discovered in 2017, it previously caused only SMS-related scams, but has since expanded to include intercepting one-time passwords and other security codes, sending and receiving SMS, and reading notifications. did. The Google Play store continues to stop these apps, but many users have already downloaded them. Therefore, download the app wisely first and then remove the app when the Google Play store warns and shuts down.
You may have used public WiFi at some point. These are available at airports, train stations, restaurants, hotels and more. They are free, but they are not without cybersecurity breaches. The main concern with public WiFi is the lack of encryption. This poses a serious threat, including increasing the likelihood of man-in-the-middle (MITM) attacks. A third party intercepts the communication between the two. Therefore, the connection between the client and the server is lost. The hijacker can now present his own version of the website.
The compromised router is another issue. This is because hackers can suck up personal activity. On the other hand, if they break into your email, they can easily access your private conversations, details, and even your password. So what’s the loophole? First, don’t use public WiFi for sensitive activities such as: B. For financial transactions. However, in case of emergency, please use VPN (Virtual Private Network). Similarly, avoid accessing unsecured websites and use VPNs as needed. There are several VPN services available online, but make sure you are using a trusted service provider. The good man demands that you pay.