In a time when cyberattacks have reached an all-time high, it’s best we all clean up our act and give ourselves a good cyberscrub. So here are some cybersecurity tips to take you into 2020.
Good web hygiene leave no trace for advertisers or businesses to target you. But more importantly, they make it troublesome for hackers to find you.
Most hackers are lazy. They want minimal work for maximum return. If you’re an easy target, they’ll find out very quickly. If it will take even just a little effort to target you, they’ll move on to someone else.
Don’t let yourself become a statistic in 2020. Put aside 5 minutes every day to tick each of these simple things off the list…
The most important cybersecurity hack - secure passwords
Passwords are the first line of defence in cybersecurity, yet are often the weakest. In fact, approximately 80 percent of all data breaches are due to weak or reused passwords.
If you use the same password across multiple accounts, that’s bad. If you use the SAME password for EVERY account – that’s just asking for it. It’s likely your email/password combination has been stored in a database that’s been hacked.
You can check here if you’ve been “pwned” (have an account that has been compromised in a data breach). You bet some hacker out there will try to use the same combination to gain access to your email or online banking. They can steal your money or even your identity – identity theft is on the rise.
Do a password audit. If you have Gmail for example, this can be done by going into your account settings and doing a general security check. Make sure each password is different for every account.
Find out if your passwords have been compromised and if so, immediately change all of them.
Google chrome can suggest new strong passwords. You can also set up an account with 1Password, which can generate and store all of your different passwords. A lot of people ask are password managers safe?
If you can’t remember or understand your password, that’s best. Memorable or human-readable passwords are weak.
Create different emails for different purposes
It’s easy to create new, separate email addresses which can be used for specific reasons. You can have a private email account that is used for things such as banking, tax, government services and medical accounts.
Use a different email to deal with work, clients and customers – it’s a great way to separate your personal data from your professional life.
Have an everyday account for things like online shopping, subscription services. That way, if this kind of database is hacked (more likely than your banking or government accounts), your email won’t be traced back to those important accounts.
Wipe cookies, clear cache, and always go incognito
Cookies are the little crumb trails that websites leave behind in your browser or device. They are user-specific, so it helps the website remember you and keep track of your activity, such as saving your login details for next time. Cookies can be harmless – but some are rotten.
There are third party tracking cookies which can track your physical movements and see your browsing history. In one extreme case in 2016, Verizon was fined by the FCC over a “supercookie” technology which allowed third-party advertisers and websites to “assemble a deep, permanent profile of visitors’ web browsing habits without their consent.”
Safari, Firefox and Chrome are all taking measures to phase out the use of tracking cookies, with the latter starting a privacy-first initiative to make these third-party cookies “obsolete” by 2022.
Due to GDPR, you would have noticed that most websites now ask you to accept their cookie settings.
Try always to choose only the necessary or required amount – this will be the least invasive. And most importantly – go “incognito” whenever you can. This will stop those pesky cookies.
If you’re using Chrome, you can easily check the cookies stored by each browser. Click on the lock symbol in your URL bar and select “Cookies”. You can then block or remove cookies you want.
Note that this may affect your typical browsing experience.
You can update or delete your cookies by going into your browser settings:
For Chrome
For Firefox
For Safari
For iPhone, iPad
For Android
Offline cold storage - store important files on an external hard drive or USB
Try to store all of your important documents offline, such as scans of your passport, bank statements, contracts and other sensitive information you wouldn’t want to fall into the wrong hands. Every so often, sift through your downloads and move your important things into your hard drive, then delete them off your computer.
Turn on 2FA!
Turn on Two-Factor authentication to create one extra security layer – and possibly the most annoying barrier to accessing your devices. If an app or website gives you the option to enable 2FA, always do it! Text message, biometrics, or authenticator code – it costs you nothing except a few extra seconds and is probably the one hurdle a hacker won’t be bothered to jump over.
Don’t save card details online
This one is a given. When a website asks if you’d like to save your card details for the sake of convenience – just don’t. Some web browsers, like Google Chrome, will auto-fill your details. You can stop that here.
Turn off location services
This one’s easy. Go into your app settings and disable location services for every app that does not require it to function. Some apps, though need your location to work correctly like Uber or Maps, can often have the setting “only track location while using app” – switch to this if possible.
iPhone users follow this guide.
Android users, here’s all you need to know.
Don’t use public wifi - unless you’re using a VPN
Last but not least – if you’re working from a cafe, browsing online at the airport or just connecting to some shady public wifi that pops up – try to avoid using it all. If you MUST, avoid doing anything particularly private, like logging into your bank account.
If you connect to public wifi regularly, then use a good VPN (like Mysterium’s free VPN for Android) every time you need to connect to public wifi.
Learn more about our free VPN. It was the world’s first decentralized VPN, too.
Time to clean up your act! Get hack-proof best cybersecurity tips Get hack-proof best cybersecurity tips
In the world of cryptocurrency trading, having reliable trading signals can be the difference between success and failure. Cubepad.io stands out as a valuable resource for traders looking to maximize profitability in the market. One of the site’s key topics is the effective use of cryptocurrency trading bots. These bots act like vigilant guards, constantly analyzing market conditions and executing trades with precision. High-frequency trading bots are another focus, with their ability to execute trades at lightning speed. These automated systems leverage complex algorithms to make split-second decisions, contributing to market volatility while offering significant profit potential. The impact of these bots on market stability is thoroughly discussed, providing traders with a balanced view of their advantages and challenges. Algorithmic…
It’s easy to create new, separate email addresses which can be used for specific reasons. You can have a private email account that is used for things such as banking, tax, government services and medical accounts. Use a different email to deal with work, clients and customers – it’s a great way to separate your personal data from your professional life. Have an everyday account for things like online shopping, subscription services. That way, if this kind of database is hacked (more likely than your banking or government accounts), your email won’t be traced back to those important accounts.
As we embark on a new digital decade, implementing robust cyber security solutions is more critical than ever. Key tips include using multi-factor authentication, keeping software and systems up to date, and regularly backing up data. Additionally, educating employees on recognizing phishing attempts and securing personal devices can significantly reduce risks. Embracing advanced cyber security solutions like AI-driven threat detection and response systems can provide an extra layer of protection. By adopting these practices, individuals and organizations can better safeguard their digital assets against evolving cyber threats.