Shield Yourself from Online Hackers: A Quick Start Guide
You’d be hard-pressed to find someone who doesn’t hop on the web for something every day.
Whether you’re screen-bound for work, shop online, or enjoy scrolling through social media to unwind at the end of the day, our worlds are inundated with the internet. We’re constantly on it, sharing our lives and oftentimes, our sensitive data.
We know this and hackers do, too. With cybercriminals becoming increasingly sophisticated, it's crucial to take proactive measures to protect our data from potential threats.
Here’s a quick start guide to walk you through the basics of shielding yourself online.
1. KEEP AN EYE OUT FOR COMMON CYBER THREATS
As technology evolves, so do the tools hackers use to try to swipe our information. While it’s impossible to keep up with every new tactic, here are common threats to always be on the lookout for:
PHISHING
This looks like a hacker’s attempt to obtain sensitive information by disguising themself as a trustworthy company, software provider, or someone claiming to protect your information on your behalf.
Always be wary of odd-looking email addresses, poorly formatted emails, or requests for sensitive information like usernames, passwords, social security numbers, or wiring requests.
DEBT COLLECTOR SCAMS
This looks like someone claiming you owe back taxes, late fees, or incurred debt payments. Rushed demands to make payments online or over the phone is a common tell-tale sign that this might be a scammer.
FAKE JOB OFFERS
Do your homework when a company approaches you with a job offer. Vet the contact’s name and verify their email address, asking detailed questions about the job process before providing any personal information.
BANK IMPERSONATION CALLS OR TEXTS
Be mindful when you receive a call or text from someone claiming to be a representative of a banking institution calling you about an issue with your account or a transaction you made. Before you verify your identity by providing your account details or social security number, call your bank yourself to confirm the situation.
FREE GIFTS VIA TEXT, EMAIL, OR QR CODE
Be wary of clicking any out-of-the-blue hyperlinks or attachments sent to you via text or email. Even if they’re from contacts you know, there’s always a chance they were hacked themselves and the hacker is taking advantage of the access and sending malware-infested messages to their contacts.
Hackers and scammers target the vulnerable elderly more and more each year online. To protect the older folks in your life, we share 9 micro lessons to help keep Granny safe online.
2. USE STRONG PASSWORD PRACTICES
Your passwords are the first line of defense. Using different passwords for different platforms and updating them regularly is the easiest way to safeguard your information.
Here are some best practices for creating and managing passwords:
Come up with unique passwords with a mix of letters, numbers, and symbols.
Use a password manager to store your passwords, especially if you’re diligent in updating them often to save you the headache.
Always make use of the two-factor authentication option on accounts for added security.
3. UPDATE YOUR ANTI-VIRUS SOFTWARE AND OPERATING SYSTEM REGULARLY
It’s easy to put off that little update notification, but try your best to run updates as soon as they’re made available. Software updates often include patches for security flaws, helping keep you safe from the latest threats.
Set these programs to update automatically to save you the step.
Need an anti-virus software recommendation? We suggest ESET.
4. PASSWORD PROTECT SENSITIVE FILES
Password protect PDFs you send via email that hold important data like social security numbers, addresses, health history, or financial information.
5. USE A VPN TO PROTECT YOUR ONLINE ACTIVITY
A VPN, like ExpressVPN or Surfshark, encrypts your IP address and shields your identity as you browse the web. This comes especially in handy when you jump onto public WiFi networks.
6. BACKUP DATA REGULARLY
In the event of a cyberattack that holds your system or data ransom until an amount of money is paid, also referred to as ransomware, running regular backups could be a lifesaver in recovering vital information.
Use a service like iDrive or Carbonite to run automatic backups and consider cloud-based storage to ensure you’ll be able to access necessary files in the event of a cyber lockdown.
- Schedule automatic backups to ensure data is consistently saved.
- Store backups in multiple locations, including offline and cloud-based solutions.
- Regularly test backup systems to ensure data can be restored quickly and effectively[2].\
While the tactics of cybercriminals are evolving right alongside tech, there are measures we can take to reduce the risk of an attack.
Safeguarding your sensitive information and protecting yourself online begins with having a watchful eye on suspicious activity, updating our passwords, systems, and programs regularly, and ensuring our sensitive data is encrypted, backed up, and stored safely.
Need a helping hand selecting and implementing the software and systems that will keep you and your data safe? Drop us a message, and we’ll get you protected in no time.