10 Easy Things You Can Do Today to Improve Your Cybersecurity

With
the
number
of
cyber
threats
and
breaches
dominating
the
headlines,
it
can
seem
like
a
Herculean
task
to
cover
all
your
cybersecurity
bases.

10 Easy Things You Can Do Today to Improve Your Cybersecurity


With
the
number
of
cyber
threats
and
breaches
dominating
the
headlines,
it
can
seem
like
a
Herculean
task
to
cover
all
your
cybersecurity
bases.
We’re
aware
that
there
are
ten
sections
on
this
cybersecurity
awareness
checklist,
but
it
won’t
take
hours
and
hours
to
tick
every
box.
In
fact,
some
of
these
areas
only
require
you
to
check
a
box
on
your
device
or
invest
in
the



cybersecurity
tools


that
will
handle
the
rest
for
you.
Also,
you
may
already
be
doing
some
of
these
things! 
 


It’s
easy
to
be
cyber
smart.
Here
are
the
cybersecurity
awareness
basics
to
instantly
boost
your
safety
and
confidence
in
your
online
presence.
 



1.
Update
Your
Software


Software
update
notifications
always
seem
to
ping
on
the
outskirts
of
your
desktop
and
mobile
device
at
the
most
inconvenient
times.
What’s
more
inconvenient
though
is
having
your
device
hacked.
One
easy
tip
to
improve
your
cybersecurity
is
to
update
your
device
software
whenever
upgrades
are
available.
Most
software
updates
include
security
patches
that
smart
teams
have
created
to
foil
cybercriminals.
The
more
outdated
your
apps
or
operating
system
is,
the
more
time
criminals
have
had
to
work
out
ways
to
infiltrate
them. 
 


Enabling
automatic
updates
on
all
your
devices
only
takes
a
few
clicks
or
taps.
Many
major
updates
occur
in
the
early
hours
of
the
morning,
meaning
that
you’ll
never
know
your
devices
were
offline.
You’ll
just
wake
up
to
new,
secure
software!
 



2.
Edit
Your
Social
Media


Just
because
social
media
personalities
document
their
entire
days
literally
from
the
moment
they
wake
up,
doesn’t
mean
you
should
do
the
same.
It’s
best
to
leave
some
details
about
your
life
a
mystery
from
the
internet
for
various
reasons.
 



  • Doxing.


    When
    you
    post
    something
    online,
    it
    leaves
    its
    mark.
    At
    least
    one
    of
    your
    followers
    or
    friends
    is
    likely
    to
    catch
    a
    post,
    even
    if
    you
    delete
    it
    minutes
    later.



    Doxing


    is
    a
    scheme
    where
    a
    criminal
    unearths
    unflattering
    posts
    or
    personal
    details
    revealed
    online
    (like
    a
    home
    address
    or
    workplace)
    about
    someone
    and
    then
    releases
    them
    to
    a
    wide
    audience.
    A
    doxer
    “drops
    documents”

    the
    origin
    of
    the
    term
    doxing

    with
    the
    aim
    to
    embarrass
    their
    target
    or
    kick
    off
    a
    large-scale
    cyberbullying
    campaign. 
     


  • Social
    engineering.


    Cybercriminals
    lurk
    on
    social
    media
    channels
    hoping
    to
    find
    an
    over-sharer
    for
    their



    social
    engineering


    scams.
    A
    social
    engineer
    learns
    as
    much
    as
    they
    can
    about
    the
    personality
    and
    passions
    of
    their
    target
    and
    then
    tailors
    scams
    that
    are
    most
    likely
    to
    get
    a
    response.
    Especially
    with
    the
    help
    of
    artificial
    intelligence
    (AI)
    tools
    like



    ChatGPT
    ,
    their
    scams
    are
    getting
    more
    believable
    by
    the
    day.
     


  • Stalking.


    Geotagging,
    or
    the
    inclusion
    of



    your
    location
    on
    social
    media
    posts
    ,
    can
    leave
    you
    vulnerable
    to
    stalking.
    Over-sharing
    about
    your
    life
    can
    also
    lead
    to
    you
    unknowingly
    dropping
    hints
    about
    where
    you
    live,
    your
    daily
    habits,
    and
    where
    one
    could
    expect
    you
    at
    a
    certain
    time
    and
    place.
     


The
best
way
to
avoid
all
of
the
above
is
to
set
your
online
profiles
to
private
and
edit
your
list
of
followers
to
only
people
you
have
met
in
real
life
and
trust.
Also,
you
may
want
to
consider
revising
what
you
post
about
and
how
often.
 


If
you
genuinely
love
sharing
moments
from
your
daily
life,
consider
sending
a
newsletter
to
a
curated
group
of
close
friends
and
family.
Aspiring
influencers
who
still
wants
to
capture
and
publish
every
aspect
of
their
daily
lives
should
be
extremely
careful
about
keeping
sensitive
details
about
themselves
private,
such
as
blurring
their
house
number,
not
revealing
their
hometown,
turning
off
location
services,
and
going
by
a
nickname
instead
of
their
full
legal
name.
 



3.
Strengthen
Your
Passwords


Most
sites
won’t
even
let
you
proceed
with
creating
an
account
if
you
don’t
have
a
strong
enough
password.
A



strong
password


is
one
with
a
mix
of
capital
and
lowercase
letters,
numbers,
and
special
characters.
What
also
makes
for
an
excellent
password
is
one
that’s
unique.
Reusing
passwords
can
be
just
as
risky
as
using
“password123”
or
your
pet’s
name
plus
your
birthday
as
a
password.
A
reused
password
can
put
all
your
online
accounts
at
risk,
due
to
a
practice
called
credential
stuffing.
Credential
stuffing
is
a
tactic
where
a
cybercriminal
attempts
to
input
a
stolen
username
and
password
combination
in
dozens
of
random
websites
to
see
which
doors
it
opens. 
 


Remembering
a
different
password
for
each
of
your
online
accounts
is
almost
an
impossible
task.
Luckily,
password
managers
make
it
so
you
only
have
to
remember
one
password
ever
again!
Password
managers
safeguard
all
your
passwords
in
one
secure
desktop
extension
or
smartphone
app
that
you
can
use
anywhere.
 


It’s
best
to
create
passwords
or
passphrases
that
have
a
secret
meaning
that
only
you
know.
Stay
away
from
using
significant
dates,
names,
or
places,
because
those
are
easier
to
guess.
You
can
also
leave
it
up
to
your
password
manager
to
randomly
generate
a
password
for
you.
The
resulting
unintelligible
jumble
of
numbers,
letters,
and
symbols
is
virtually
impossible
for
anyone
to
guess.
 



4.
Surf
Safely


Not
all
corners
of
the
internet
are
safe
to
visit.
Some
dark
crevices
hide
malware
that
can
then
sneak
onto
your
device
without
you
knowing.
There
are
various



types
of
malware
,
but
the
motive
behind
all
of
them
is
the
same:
To
steal
your



personally
identifiable
information


(PII)
or
your
device’s
power
for
a
cybercriminal’s
own
financial
gain. 
 


Sites
that
claim
to
have
free
downloads
of
TV
shows,
movies,
and
games
are
notorious
for
harboring
malware.
Practice



safe
downloading
habits
,
such
as
ensuring
the
site
is
secure,
checking
to
see
that
it 
looks
professional,
and
inspecting
the
URLs
for
suspicious
file
extensions.
 


Additionally,
not
all
internet
connections
are
free
from
prying
eyes.
Public
Wi-Fi
networks

like
those
in
cafes,
libraries,
hotels,
and
transportation
hubs

are
especially
prone.
Because
anyone
can
connect
to
a
public
network
without
needing
a
password,
cybercriminals
can
digitally
eavesdrop
on
other
people
on
the
same
network.
It’s
unsafe
to
do
your
online
banking,
shopping,
and
other
activities
that
deal
with
your
financial
or
sensitive
personal
information
while
on
public
Wi-Fi. 
 


However,
there
is
one
way
to
do
so
safely,
and
that’s
with
a



virtual
private
network


(VPN).
A
VPN
is
a
type
of
software
you
can
use
on
your
smartphone,
tablet,
laptop,
or
desktop.
It
encrypts
all
your
outgoing
data,
making
it
nearly
impossible
for
a
cybercriminal
to
snoop
on
your
internet
session.
 



5.
Read
Your
Online
Messages
Carefully


You’ve
likely
already
experienced
a



phishing


attempt,
whether
you
were
aware
of
it
or
not.
Phishing
is
a
common
tactic
used
to
eke
personal
details
from
unsuspecting
or
trusting
people.
Phishers
often
initiate
contact
through
texts,
emails,
or
social
media
direct
messages,
and
they
aim
to
get
enough
information
to
break
into
your
online
accounts
or
to
impersonate
you.  
 


AI
text
generator
tools
are
making
it
more
difficult
to
pinpoint
a
phisher,
as
messages
can
seem
very
humanlike.
Typos
and
nonsensical
sentences
used
to
be
the
main
indicator
of
a
phishing
attempt,
but
text
generators
generally
use
correct
spelling
and
grammar.
Here
are
a
few
tell-tale
signs
of
a
phishing
attempt: 
 


  • Choppy
    writing,
    or
    when
    one
    sentence
    doesn’t
    sound
    natural
    or
    flow
    into
    the
    one
    after
    it 
     

  • Links
    to
    suspicious-looking
    URLs 
     

  • A
    tone
    of
    urgency,
    fear,
    anger,
    or
    pleas
    for
    sympathy 
     

  • Requests
    for
    banking
    or
    personal
    details,
    passwords,
    or
    money
    wires
     

  • Blurry
    logos
    and
    images
     

  • Generally
    odd
    demands
    that
    seem
    out
    of
    character
    for
    the
    sender
     


Never
engage
with
a
phishing
attempt.
Do
not
forward
the
message
or
respond
to
them
and
never
click
on
any
links
included
in
their
message.
The
links
could
direct
to
malicious
sites
that
could
infect
your
device
with
malware
or
spyware.  
 


Before
you
delete
the
message,
block
the
sender,
mark
the
message
as
junk,
and
report
the
phisher.
Reporting
can
go
a
long
way
toward
hopefully
preventing
the
phisher
from
targeting
someone
else.
  



6.
Keep
Up
With
the
News


When
a
security
breach
occurs,
you
can
be
sure
that
the
news
will
report
it.
Plus,
it’s
the



law
for
companies
to
notify
the
Federal
Trade
Commission


of
a
breach.
Keep
a
keen
eye
on
the
news
and
your
inbox
for
notifications
about
recent
breaches.
Quick
action
is
necessary
to
protect
your
personal
and
financial
information,
which
is
why
you
should
be
aware
of
current
events. 
 


The
moment
you
hear
about
a
breach
on
the
news
or
see
an
email
from
a
company
to
its
customers
about
an
incident,
change
your
account’s
password
and
double
check
your
account’s
recent
activity
to
ensure
nothing
is
amiss.
Then
await
further
action
communicated
through
official
company
correspondences
and
official
channels.
 


Cybercriminals
aren’t
above
adding
insult
to
injury
and
further
scamming
customers
affected
in
breaches.
Phishers
may
spam
inboxes
impersonating
the
company
and
sending
malware-laden
links
they
claim
will
reset
your
password.
Continue
to
scrutinize
your
messages
and
keep
an
eye
on
the
company’s
official
company
website
and
verified
social
media
accounts
to
ensure
you’re
getting
company-approved
advice. 
 



7.
Secure
Every
Home
Device


One
great
mantra
to
guide
your
cybersecurity
habits
is:
If
you
connect
it,
protect
it.
This
means
that
any
device
that
links
to
the
internet
should
have
security
measures
in
place
to
shield
it
from
cybercriminals.
Yes,
this
includes
your
smart
TV,
smart
refrigerator,
smart
thermostat,
and
smart
lightbulbs! 
 


Compose
a
list
of
the



smart
home
devices


you
own.
(You
probably
have
more
than
you
thought!)
Then,
make
sure
that
every
device
is
using
a
password
you
created,
instead
of
the
default
password
the
device
came
with.
Default
passwords
can
be
reused
across
an
entire
line
of
appliances.
So,
if
a
cybercriminal
cracks
the
code
on
someone
else’s
smart
washing
machine,
that
could
mean
they
could
weasel
their
way
into
yours
with
the
same
password.
 


Another
way
to
secure
your
connected
home
devices
is
by
enabling
two-factor
authentication
(2FA).
This
usually
means
enrolling
your
phone
number
or
email
address
with
the
device
and
inputting
one-time
codes
periodically
to
log
into
the
connected
device.
2FA
is
an
excellent
way
to
frustrate
a
cybercriminal,
as
it’s
extremely
difficult
for
them
to
bypass
this
security
measure.
It
may
add
an
extra
15
seconds
to
your
login
process,
but
the
peace
of
mind
is
worth
the
minor
inconvenience.
 


Finally,
encase
your
entire
home
network
with
a
secure
router,
or
the
device
that
connects
your
home
Wi-Fi
network
to
the
internet.
Again,
change
the
password
from
the
factory
setting.
And
if
you
decide
to
rename
the
network,
have
fun
with
it
but
leave
your
name
and
address
out
of
the
new
name.
 



8.
Lock
Your
Devices


When
flip
phones
arrived
on
the
scene
in
the
1990s
and
early
2000s,
the
worst
that
happened
when
they
went
missing
was
that
you
lost
a
cache
of
your
stored
text
messages
and
call
history.
Now,
when
you



misplace
or
have
your
smartphone
stolen
,
it
can
seem
like
your
whole
online
life
vanished.
Mobile
devices
store
a
lot
of
our
sensitive
information,
so
that’s
why
it’s
key
to
not
only
safeguard
your
accounts
but
the
devices
that
house
them.
 


The
best
way
to
lock
your
device
against
anyone
but
yourself
is
to
set
up
face
or
fingerprint
ID.
This
makes
it
virtually
impossible
for
a
criminal
to
open
your
device.
Also,
passcode-
or
password-protect
all
your
devices.
It
may
seem
like
an
inconvenience
now,
but
your
fingers
will
soon
be
able
to
glide
across
the
keyboard
or
number
pad
fluently
in
just
a
few
days,
adding
maybe
an
extra
second
to
opening
your
device.
 


Another
way
to
safeguard
your
device
and
the
important
information
within
it
is
to
disable
your
favorite
internet
browser
from
auto-filling
your
passwords
and
credit
card
information.
In
the
hands
of
a
criminal,
these
details
could
lead
to
significant
losses.
A
password
manager
here
comes
in
handy
for
quick
and
secure
password
and
username
inputting. 
 



9.
Check
Your
Credit
Regularly


Credit
experts
recommend
checking
your
credit
at
least
once
yearly,
but
there’s
no
harm
in
checking
your
credit
score
more
often.
It’s
only
hard
inquiries
(or
credit
checks
initiated
by
lenders)
that
may
lower
your
credit
score.
Consider
making
it
a
habit
to
check
your
credit
once
every
quarter.
The
first
signs
of
identity
theft
often
appear
in
a
drastically
lower
credit
score,
which
means
that
someone
may
be
opening
lines
of
credit
in
your
name.
 


Also,
if
you’re
not
planning
to
apply
for
a
new
credit
card
or
a
loan
anytime
soon,
why
not
lock
your
credit
so
no
one
can
access
it?
A



credit
freeze


makes
it
so
that
no
one
(yourself
included)
can
touch
it,
thus
keeping
it
out
of
the
hands
of
thieves.
 



10.
Invest
in
Identity
Protection


Picking
up
the
pieces
after
a
thief
steals
your
identity
is
expensive,
tedious,
and
time-consuming.



Identity
remediation


includes
reaching
out
to
all
three
credit
bureaus,
filing
reports,
and
spending
hours
tracking
down
your
PII
that’s
now
strewn
across
the
internet.
 


Identity
protection
services
can
guard
your
identity
so
you
hopefully
avoid
this
entire
scenario
altogether.



McAfee
identity
monitoring


tracks
the
dark
web
for
you
and
alerts
you,
on
average,
ten
months
sooner
that
something
is
amiss
when
compared
to
similar
services.
And
if
something
does
happen
to
your
identity,



McAfee
identity
restoration
services


offers
$1
million
in
identity
restoration
and
lends
its
support
to
help
you
get
your
identity
and
credit
back
in
order.
 



Great
Habits
With
a
Side
of
Device,
Privacy,
and
Identity
Protection
Tools
 


The
best
complement
to
your
newfound
excellent
cyber
habits
is
a
toolbelt
of
excellent
services
to
patch
any
holes
in
your
defense.



McAfee+


includes
all
the
services
you
need
to
boost
your
peace
of
mind
about
your
online
identity
and
privacy.
You
can
surf
public
Wi-Fi
safely
with
its
secure
VPN,
protect
your
device
with
antivirus
software,
freeze
your
credit
with
security
freeze,
keep
tabs
on
your
identity,
and
more!
 

Introducing
McAfee+

Identity
theft
protection
and
privacy
for
your
digital
life

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.