...

12 Ways to Protect Yourself on the Internet

This WordPress post provides 12 practical steps to protect yourself against malicious threats and online risks while using the internet. It emphasizes the importance of using strong passwords, avoiding risky links, avoiding public Wi-Fi, using a virtual private network, backing up your data, staying vigilant of scams, and regularly updating your systems. This comprehensive guide provides an overview of essential tips for doing business safely and securely online and helps ensure users are secure when sharing personal information online.

How to protect yourself on the Internet

The World Wide Web entertains us, teaches, introduces and helps to earn. However, without knowledge of the rules of digital hygiene, it is easy to become a victim of scammers or simple pests. We tell you how to protect yourself on the Internet and not to lose personal data.

What is the danger?

protect yourself on the internet

• Fraud (fraud). When a user pays for purchases or services with a credit card on a malicious website, the creators of the resource can get access to the user’s details.

• Hacking accounts. The case when attackers receive logins and passwords from mail, online banking or social networks.

• Data leakage. Collection of personal information of a person for transfer to third parties. Facebook got into such a scandal. The social network allowed the massive transfer of data to 50 million users, who were then shown political targeted ads.
• Penetration. Providing remote access for fraudsters to a personal computer through malware.

• Phishing. Fake sites for popular services: social networks, payment resources, online banks. Newsletters that are disguised as newsletters from reputable sites (Google, Mail.ru, Facebook, VK). They are designed for a person’s carelessness and try to get access to confidential data – logins and passwords.

• Deception. Offer in social networks, online stores, message boards, where the seller is ready to give the goods for a low price. Payment is accepted online or by card transfer. After the attacker disappears and does not contact.


What helps protect yourself on the Internet?


To protect yourself on the Internet you do not need to build a defense against each type of penetration – it is enough to follow comprehensive security measures and use common sense. This will reduce the likelihood of personal information leakage and prevent malware from getting started..

1. Antivirus

protect yourself on the internet

This is basic security software. The tasks of antivirus software include the detection of spyware, viruses, phishing resources, dangerous servers and suspicious traffic. Popular antiviruses cope with most of the threats that come to the computer from the network or removable media. True, they do not protect against user actions on sites. That is, if the resource did not arouse suspicion in the program and opened, clicking on links or actions with elements will no longer be protected.

2. VPN

protect yourself on the internet

VPN is a secure network that hides the IP address and location. It reliably encrypts all traffic and data transmitted from the device. If you need to bypass the blocking of the site, get anonymity on the network or connect to Wi-Fi in a public place, use a VPN.

The technology itself works like this:

1. Information is encrypted on the device.
2. It is transmitted to the server of the VPN provider.
3. Decrypts on the server.
4. Transmitted as intended (to the site server).

Thus, personal information is protected from interception, it is completely encrypted, personal data is hidden. Blocking sites, for example, from Roskomnadzor cease to work. Presence on the network looks like you went online not from Russia, but from another country (where the VPN server is located).

Free VPN offer Windscribe and Privatix.

3. Temporary anonymous mail

protect yourself on the internet

Temporary mail is a mailbox with a random address and a limited lifespan. It is convenient when you need access to the service with registration, and you do not plan to use it for a long time. In addition, the “makeshift” themselves are usually not asked to login or provide personal information. Just go to the site and apply.

There are many temporary mail services and it’s not difficult to find a convenient option. Pay attention to these:

Temp mail
• Dropmail
Tempr
EmailOnDeck 

Such mail does not protect against consequences after clicking on suspicious links and does not prevent the “drain” of data on a phishing resource. But it helps to minimize incoming spam, in which such dangers are often hidden.

4. Permanent encryption

protect yourself on the internet

To prevent the result of actions on the site from leaking personal data or a spam attack on mail, use resources whose network address starts with HTTPS. This means that the connection between you and the server is encrypted – the information cannot be intercepted..

Modern browsers are reminiscent of the risk of an unencrypted connection. If the data does not match when checking the certificate, a warning appears on the screen. True, it can be ignored by clicking “I accept the risk, go anyway”.

To increase the level of protection, encrypt as much Internet traffic as you can with the extension HTTPS Everywhere. It automatically forces sites to use the HTTPS protocol instead of HTTP. It can be installed for free on Google Chrome, Mozilla Firefox, and Opera, including on mobile devices..

Information in cloud storage also does not prevent to add protection. Install a program to encrypt data in the cloud, for example, Boxcryptor or nCrypted Cloud.

5. Strong passwords

protect yourself on the internet

The complexity of passwords directly determines their strength, so it is recommended to use long random combinations of characters. Firstly, they are almost impossible to crack by brute force. Secondly, they are not tied to the user’s identity.

The password in the form of the name of the spouse or child, date of birth, dog name, name of your favorite team are directly related to you. This is the information that attackers can pick up if they gain access to a social network, mail or computer.

Therefore, 17041991 is a bad password. Masha17041991 or 1704masha1991 too. And Vy0 @ $ e6 # Omx6 is a strong password. It is impossible to collect on the basis of data about a person, but it is difficult to find by technical search.

Do not use the same passwords. Ideally, each case should have its own combination. Using the same code for all email accounts, social networks and banking services is dangerous.

Everything will be difficult to remember. Therefore, set up a password manager for storage:

Keepass
Lastpass
Roboform
Protect (add-on by Yandex.Browser)

6. Two-factor authorization (authentication)

protect yourself on the internet

To protect yourself on the Internet, use two-factor authentication. This means that when you try to log in to the service, you will need to specify two secret evidence parameters. With standard input, there is only one such parameter – password. In the case of two-factor authentication, you will need to enter another one. Most often, this is a randomly generated code, which is sent in SMS to the phone. If the attacker took possession of the password, then he will not be able to log into the account.

Now two-factor authentication is used by most major services: Microsoft, Google, Facebook, Yandex, Dropbox, VKontakte, Instagram. For confirmation, they use SMS, mobile applications, tokens (rarely), backup keys.

7. Caution with mail

protect yourself on the internet

Be careful with the files attached to the emails in the email. Never open or run them if the source is unknown. Otherwise, make sure that he really sent you an important document. Do not forget to check the file with antivirus as well – suddenly the sender spreads threats, but does not suspect it.

8. Timely software update

protect yourself on the internet

Criminals are improving their tools, and developers from the “bright” side are strengthening the defense. Both rivals learn each other’s methods and try to respond to changes in a timely manner. New hacking and snooping options get into the network every day, therefore, to reduce risks to a minimum, you must regularly update the software. It includes an antivirus, an operating system, and a browser..

9. Environmental safety

The threat can penetrate the computer not only directly from the network or the file received by mail. The source can be a local network at work, an infected device of one of the family members, a vulnerable Wi-Fi point in a public place.

Try to check the degree of security of all devices and networks to which you are connecting. And in public places, it’s best not to use open networks at all for online payment or authorization in web services (if there is no VPN).

10. Secret Search Engine

protect yourself on the internet

Use Duckucko go. This is a system that does not collect data about its visitors, does not store IP addresses and cookies. There is no advertising, and the search results are objective (Google and Yandex create a personalized feed of results that some useful links may not fall into). DuckDuckGo – helps protect yourself on the Internet and ensure privacy while searching for information on the network.

11. Secret browser

protect yourself on the internet

Tor – a sensational browser, which, contrary to the philistine opinion, is popular not only among drug dealers and terrorists. Tor passes the connection to the destination server through several intermediaries and, thus, hides data about the user and his device. No one will know what your IP address is, what sites you visit, and what files you transfer. The program interferes with the operation of all elements that could potentially be used to obtain information about users.

12. Phone and tablet

protect yourself on the internet

Any device that is easily lost must be further protected, that is, set a graphic or digital code to unlock. This is enough to prevent most dangers. Just do not choose to lock the date or the simplest combinations.

For full encryption of devices, use the built-in functionality of the system. On Android, check out “Settings -> Security “, on iOS in” Settings -> Password”.

Similar articles
  • Mozilla Researchers on the Internet

    Many of us spend a lot of work and personal time on the Internet. But what do we really know about the World Wide Web? Mozilla Researchers – Companies,…

  • What is big data and what is it for?

    Big data Big data is the direction everyone is talking about, but few people know it well. Ecommerce Giants, Industrial…

  • Yandex (consumer Internet services)

    The use of artificial intelligence Digital intelligence has ceased to be something fantastic and futuristic. There are more and more areas in which…

Rate the article
( No ratings yet )
Recommender Great
Tips on any topic from experts
Comments: 3
  1. Oakley

    How can I ensure my safety while browsing the internet? Are there any specific precautions I should take?

    Reply
  2. Layla Turner

    How effective are these 12 ways in protecting oneself on the internet? Have they been tested and proven to be reliable, or are there alternative methods that may offer better protection?

    Reply
    1. Cole Reynolds

      The 12 ways to protect oneself on the internet are generally effective in enhancing online security. These methods, such as using strong passwords, enabling two-factor authentication, and keeping software updated, have been tested and proven to be reliable in safeguarding against cyber threats. While there may be alternative methods available, the combination of these 12 strategies covers a wide range of potential risks and provides a solid defense against common online threats. It is important to stay informed about the latest security practices and technologies to ensure continuous protection on the internet.

      Reply
Add comments