We all now live in a world of technology and the Internet. Each of us uses mail, has a social media account, or just spends our free time watching videos. However, very often, we despise and neglect the rules of our security on the Internet. It is easier for us to use one password on all accounts, accept all cookies, update programs, and do not install antivirus.
As a graduate of the University of Cybersecurity, I will tell you a few essential points about protecting yourself and your information.
First of all, let's think about who can be a hacker, who needs your personal or non-personal data. A hacker can be anyone. Even when a girl takes her boyfriend's phone to check his message, it's already hacking and stealing personal information. Also, your competitors, cybersecurity, and national security workers.
What are the goals of criminals:
⁃ material benefit;
⁃ political;
⁃ for fun;
⁃ personal.
Remember the victim is each of us!
As a graduate of the University of Cybersecurity, I will tell you a few essential points about protecting yourself and your information.
First of all, let's think about who can be a hacker, who needs your personal or non-personal data. A hacker can be anyone. Even when a girl takes her boyfriend's phone to check his message, it's already hacking and stealing personal information. Also, your competitors, cybersecurity, and national security workers.
What are the goals of criminals:
⁃ material benefit;
⁃ political;
⁃ for fun;
⁃ personal.
Remember the victim is each of us!
So, full o with a password. It must be more than 12 characters, letters of a different case, memorable characters, and numbers. Also, in no case do not use your name, the names of loved ones, pets, dates of birth, and everything related to you personally. Do not store your password in your phone, computer, or notebook, only in your head. Do not create one password for all networks, especially if you do not have a Google account, because hacking one Google account from an attacker will have access to all your accounts. I suggest you create one hard, strong password and use unique password storage resources such as LastPass, 1Password, dashlane, keeper, Roboform or onelogin.
Now let's talk about email. Most importantly, do not reply to spam messages or open any documents or links from unknown or unverified resources. I suggest watching the video "This is what happens when you reply to spam email". Also, to check if your email has been hacked, you can use the website "Have I been pwned?" I will share with you some important rules regarding your software and programs:
1. Install antivirus and update it
2. Update everything on time
3. Use only licensed software
4. Also, remember to lock your computer and mobile phone.
Now let's talk about email. Most importantly, do not reply to spam messages or open any documents or links from unknown or unverified resources. I suggest watching the video "This is what happens when you reply to spam email". Also, to check if your email has been hacked, you can use the website "Have I been pwned?" I will share with you some important rules regarding your software and programs:
1. Install antivirus and update it
2. Update everything on time
3. Use only licensed software
4. Also, remember to lock your computer and mobile phone.
Next, we will analyze the messaging, use only protected messengers; the best is Signal, telegram, and WhatsApp are also acceptable. Try never to join open waifs, and even if you have already joined, do not enter any passwords or bank data.
So we got to another critical point: banking. A few rules for this:
1. Use a separate card for online purchases
2. Do not buy it from little-known online stores
3. Use only atms you know
4. Never share your bank data, such as expiration date, CVC-code, cardholder name.
The weakest link in cybersecurity is between the chair and the monitor.
Remember about your safety not only offline but also online.
So we got to another critical point: banking. A few rules for this:
1. Use a separate card for online purchases
2. Do not buy it from little-known online stores
3. Use only atms you know
4. Never share your bank data, such as expiration date, CVC-code, cardholder name.
The weakest link in cybersecurity is between the chair and the monitor.
Remember about your safety not only offline but also online.