So, you’ve bought yourself a lifetime subscription to the latest top-of-the-range, cover-everything cybersecurity suite. Awesome. Now you can just click and download to your heart’s content without worrying about a thing, right? Wrong.
You may have the greatest security software known to humanity, but you still have to do your bit. There’s always the human element, and it’s usually the weakest link when it comes to online security.
A list of the best security software deserves its own article. There are lots of easy things you can do to protect yourself from online security threats. Armed with a little technical knowledge and some good habits, there’s every chance you’ll avoid serious issues. Want to find out how easy it is to keep yourself safe online? Read on.
Some of us are inundated with emails on a daily basis, while others have a far lighter flow. Either way, it only takes one well-crafted fake email to cause considerable damage.
Let’s take a look at the threats that can drop into your inbox, and how to spot the danger before it’s too late.
Check the sender
Look closely at the email address. The logo may be very convincing, and the sender’s address may only be one character different from the official one they’re pretending to be.
For example, take a quick look at these:
Get my point? You can also help protect yourself from email scams by asking yourself the following questions:
- Do I regularly receive emails from them?
- Have I recently interacted with them via their website or made a purchase?
If you’ve answered “No” to one or both of these questions, why would they suddenly send you an email now? These are all indicators that the unsolicited email you’ve received isn’t what it appears to be.
Beware of links
When you receive links embedded in an email, there are two things you can do. Firstly, hover your mouse over the link (without clicking) until a small caption box appears. The caption will show the address of the page that the link leads to. Look carefully at the address, and if you have the slightest doubt, don’t click on it.
Secondly, you can open your browser, go to the homepage of the supposed sender of the email, and navigate directly to the page that the link in the email claims to be leading to. It’s a straightforward way of avoiding the hazard of potentially dangerous links.
A malicious email attachment could be harboring all kinds of malware: viruses, Trojans, spyware, and ransomware are just a few of them. Before you open one, there are a few things you can check – without needing great technical knowledge. Here are a few of them.
- What’s the file extension? Sometimes, malicious attachments have unusual ones.
- Are you expecting an attachment from the person or company that appears to have sent the email? You can always call them to check.
- Look at the filename. If it’s got a strange name or consists of a garbled string of digits and characters, delete the email.
2. Free file downloads
When you download from peer-to-peer (P2P) networks, you’re relying completely on your security software. P2P downloading used to be extremely popular for free downloads of music, movies, and software – mainly because people tend to like free stuff. Unfortunately, due to the nature of P2P, there’s always a considerable risk that something you download could have malware bundled with it.
Nowadays, subscriptions for services such as Amazon Prime, Spotify, and Netflix are so accessible and offer such excellent value for money that it doesn’t make sense to risk infection from P2P downloads.
3. Good browser habits
Here are our top five tips for browsing the internet safely. Some of them may take an extra few moments of your time, but it’s nothing compared to the consequences of falling victim to cybercriminals.
- Use two-factor authorization whenever possible
- Keep an eye on the URL in your browser address bar – even on your search homepage
- Use a VPN, especially when browsing via public networks
- Use a unique, complex password for each of your logins
- Don’t use passwords that include personal information that could be guessed
4. Biometric security
These days, we do far more on our portable devices than ever before. It’s convenient to be able to do things like pay our bills and transfer money while you’re out for a coffee. But what happens if you lose your device?
Having to unlock your device biometrically adds an almost infallible layer of security to your phone, tablet, or PC. It’s highly unlikely that someone finding your phone will be able to imitate your iris pattern or fingerprint in order to access your device.
Additionally, an increasing number of apps give you an option for biometric login. However, there are still plenty of programs that don’t give you that option. Apps with biometric security are more common on cell phone apps than desktop PCs. That’s why it’s a great idea to enable biometric login (for example, Windows Hello) on your tablet or desktop device (if it has it).
The best policy is to place biometric protection on your device and all apps that make it available. If unauthorized individuals can’t unlock your device, they can’t get online using your identity.
5. Fake Technical Support
Do you remember how at the beginning of this guide I said that the weakest link in online security is the human element? Well, guess what? Cybercriminals know that too.
They call and try to convince you they‘re from one of the major firms like Microsoft, Google, or Apple. They say that their system has detected a vulnerability on your PC, and they need to access it remotely to apply the fix. Don’t fall for it. Genuine companies don’t make unsolicited calls offering help.
6. Mobile security
Until now, I’ve described risks and solutions in broad terms. All that advice is applicable to whatever kind of device you’re using. However, due to their nature and popularity, there are some risks that are more prevalent on cell phones. Let’s dive into four of the biggest mobile risks to your mobile internet safety.
Although this advice is just as applicable to iOS, I’m going to focus on Android devices and apps. That’s because being the most widely-used mobile operating system, it’s a bigger target for digital ne’er-do-wells.
A couple of quick definitions:
- Sideloading: When an Android app is installed from somewhere other than Google Play Store.
- APK: (Android Package): An Android app that’s been ‘repackaged’ and made accessible from outside of Play Store.
When you create APKs, they can be downloaded from outside of Google Play Store. The main problem lies in the fact that they can very easily be bundled with malware. Google checks the security of every app before it enters the Store, but if you download one from anywhere else, you don’t get that level of security. You could end up installing malware on your cell. Unless you’re an app developer, it’s best to keep away from APKs and stick to the Play Store for your apps.
These days, cell phones are the electronic equivalent of a Swiss Army knife. We use them for everything possible. Have you ever heard the expression “There’s an app for that”? There probably is.
Most cells are equipped with NFC (near field communication), which can be used for making contactless in-store payments.
The vast majority of people find it extremely convenient to wave their phone over a pay point. Rummaging around in your purse or your pants to retrieve your credit card is so twentieth-century! Why go to all that trouble when you can just grab your phone from your pocket and make a payment in a heartbeat? You guessed it: Security.
The technology in your bank card’s little gold chip is the same tech that enables your cell phone to charge wirelessly and transfer data via NFC. You may not have realized it, but it’s safer to make contactless payments with your card than with your phone. The reason is your phone’s increased connectivity.
Everyone knows that as soon as you connect a device to the internet, it’s at risk. That means when you wirelessly transfer your payment details from your cell to the in-store payment terminal, someone could hack into your connection and steal your information. The reason is that a chipped bank card doesn’t have an independent internet connection, it only becomes active when you hold it close to the scanner for payment. Furthermore, the frequency it works on is different from that of a cell phone’s internet connection.
Lost and found
What do you do when you lose your bank or credit card? You call the issuer to report it missing and they cancel it immediately. If someone finds your card they can, of course, try to use it for contactless payments – they may get lucky and find it before it’s canceled. The key thing is that all they can learn about you from your card is your name.
Imagine you haven’t followed my tips, and you lose your unsecured cell phone. Someone could get unfettered access to all your personal information, contacts, passwords, and anything else you’ve got saved in unsecured apps.
The sheer portability of a cell phone lends itself perfectly to frequent and convenient interactions on your social media accounts. The thing is, it’s easy to get carried away and “over-share”.
You should be cautious about what information you share, when you share it, and where you are when you share it. If you post detailed contact information on your profile, you could be setting yourself up as a target for scammers – think back to those bogus tech support calls I mentioned earlier.
Displaying your address on your profile means that as soon as you post that you’re enjoying a wonderful holiday in foreign climes, you’ve created an equally wonderful opportunity for burglars who know you’re not going to be home for a while.
Much is made of how social media companies use the data they gather from subscribers, but it’s your choice if you hand over totally unrestricted access to everyone online.
It’s not what you do, it’s how you do it
Look, we know we’re living in a “mobile-first” world, but there’s a lot to be said for the good old desktop when it comes to online security. I’m not trying to make you give up your mobile device (heaven forbid), but the comparison table below contains some points to ponder.
|Peripherals||Easy to hover the mouse over a suspicious link to check its validity.||No mouse.|
|Networks||Usually used in a specific location on a known, secure network.||Frequently used on public networks which can be less secure.|
|Lost and found||You can’t mislay a desktop.||Constantly on the move in public places.|
|Device Authentication||Authentication is required on your cell to prove that you’re the one logging into a site on your desktop.||On-device authentication can be useless if your phone’s already fallen into the wrong hands.|
Be vigilant and remain safe online
Staying safe online requires a combination of great security software and human awareness. It’s the same as your home security system. It’s only effective if you set it upright, use it correctly and follow basic security protocols yourself: the best system in the world won’t work if you leave the front door open.
We’re realistic enough to understand that in the constant battle between internet users and cybercriminals, there’s never guaranteed safety. What we can guarantee though, is that if you research and invest in a top internet security suite, follow our tips, and keep your wits about you, you can minimize the risks and enjoy your online activities in relative safety.