Cyber criminals are increasingly trying to steal our hard-earned money as we continue to spend more time online.
It is important to be aware of everything we do online, and to take steps to protect our identities and ourselves. It is safe to continue using the Internet at the same level as before by following the right steps.
Set up unique and strong passwords for all your online accounts. It is important to take this first step. Never use the exact same password for multiple accounts. Make sure each password is as complex as you can. You can use an online password manager if you are having trouble.
Never share your passwords. You can use this to change your passwords later, as you don’t know who else has access to your account.
You should then set up a password on your mobile device. If you lose or steal your phone, no one will be able access any of the data on it. By creating a passcode, you can ensure that your information is protected from prying eyes.
You should be careful about the information you make available on social media. You may be allowing cyber criminals to access too much personal information. They can then use this information to launch a phishing attack or guess your passwords.
Make sure you set the privacy settings on each social network to be as strict as possible so that only you and people you trust can access your information. You should also deactivate your account on social networks you no longer use.
Avoid using free Wi-Fi at public places. Hackers can easily access data shared on the network because it is so easy to get online. You should use a Virtual Private Network to protect your data if you find yourself in a situation that requires you to use public Wi Fi.
You should review all your online accounts. This includes entertainment, shopping, forums and anything else. You should delete any account you don’t use. The information could be made available to cybercriminals if it’s not deleted.
You may have old email accounts that contain personal information such as financial or health information. This information can be used to identify you and gain access to other active accounts or to send emails to contacts in an attempt to steal their information.
You can’t prevent every cyber-attack, but you can put yourself in the best position to stop them.