10 Tips For Safe Computing

Safe computing has never been more important than it is today. There are endless cybercrime threats to your security – in fact, 4.1 billion records were exposed in the first half of 2019 alone. That’s why cybersecurity spending is expected to exceed $124 billion next year.

Are you part of that number? While a good firewall or antivirus solution is always a wise investment, safe computing doesn’t always come down to how much you spend. Sometimes, it’s just a matter of what you know and what you do.

Are you practicing safe computing? Click PLAY below to check out our latest video on the top 10 tips to keep you safe online:

10 Ways To Practice Safe Computing

Safe Computing Tip #1 – Watch What You Post

Safe computing is often a matter of control of information. Remember that what you post may be seen by anyone and once it is out there, it’s probably out there for good. So be sure to:

  • Avoid posting personal details that could be used to identify you or your location—home address, phone, account numbers, etc.
  • Never share your whereabouts. For example, wait to share vacation details until after you come back. No one needs to know that you are not at your house at a specific time.
  • Pay attention to what you post about others (including pictures), being careful not to share their sensitive personal information.

Safe Computing Tip #2 – Be Careful With Public Wifi

Safe computing means being careful about who and what you trust. It’s important to use discretion when determining whether a free Wi-Fi hotspot is really worth the risk. Keep these tips in mind when considering the risks of unsecured Wi-Fi:

  • Avoid accessing sensitive info when using public Wi-Fi, such as online banking, shopping, etc.
  • Set your smartphone up with a Virtual Private Network (VPN) that encrypts your data to keep it safe from hackers.
  • Configure your smartphone so that it doesn’t automatically connect to open Wi-Fi hotspots.
  • Keep your Bluetooth function turned off unless you’re specifically using it with another device.
  • Invest in a larger data plan so that you don’t have to rely on public Wi-Fi.

Safe Computing Tip #3 -Be Careful About What You Download

One of the primary ways that cybercriminals take advantage of users is to trick them into downloading malware.

That’s why you need to train yourself to act cautiously to avoid downloading malware. It’s about thinking before you click something – never download a file, whether online or as an attachment from an email if you’re unsure of the source. It’s always better to check with the sender to confirm, prior to downloading or opening a suspect file.

Safe Computing Tip #4 – Be Smart With Your Passwords

This is a basic part of safe computing. Have you considered how strong your passwords are?

  1. Length and Complexity
    Keep in mind that the easier it is for you to remember a password, the easier it’ll be for a hacker to figure it out. That’s why short and simple passwords are so common – users worry about forgetting them, so they make them too easy to remember, which presents an easy target for hackers.
  2. Numbers, Case, and Symbols
    Another factor in the password’s complexity is whether or not it incorporates numbers, cases, and symbols. While it may be easier to remember a password that’s all lower-case letters, it’s important to mix in numbers, capitals, and symbols in order to increase the complexity.
  3. Personal Information
    Many users assume that information specific to them will be more secure – the thinking, for example, is that your birthday is one of 365 possible options in a calendar year, not to mention your birth year itself. The same methodology applies to your pet’s name, your mother’s maiden name, etc.However, given the ubiquity of social media, it’s not difficult for hackers to research a target through Facebook, LinkedIn, and other sites to determine when they were born, information about their family, personal interests, etc.
  4. Pattern and Sequences
    Like the other common mistakes, many people use patterns as passwords in order to better remember them, but again, that makes the password really easy to guess. “abc123”, or the first row of letters on the keyboard, “qwerty”, etc., are extremely easy for hackers to guess.

Safe Computing Tip #5 -Turn On Your Privacy Settings

You know you shouldn’t trust default security settings, right? Just because a program is generally considered to follow standard security practices, that doesn’t mean that it’s as secure as it should be “out of the box”.

Greater security often means less convenience – albeit, in small ways. Regardless, when it comes to modern products and services, the priority is usually to enhance the user experience, rather than configure the best security settings possible.

After all, technology should be set up to better suit you, not the companies that develop it – don’t let default settings share too much of your data.

Safe Computing Tip #6 – Enable Two-Factor Authentication

Two-factor Authentication (2FA) is a powerful tool for safe computing. 2FA requires the user to utilize two methods to confirm that they are the rightful account owner. There are three categories of information that can be used in this process:

  1. Something you have: Includes a mobile phone, app, or generated code
  2. Something you know: A family member’s name, city of birth, pin, or phrase
  3. Something you are: Includes fingerprints and facial recognition

Safe Computing Tip #7 – Only Visit Secure Websites

There’s an easy way to tell whether a website is secure or not: only use web pages with URLs that begin with “https” – if it’s missing that “s”, then it’s not secure.

Safe Computing Tip #8 – Be Careful Who You Meet Online

Cybercriminals have been known to make fake social media accounts online in order to get to know their targets, develop relationships with them, and then steal their information. Don’t get fooled – be skeptical of anyone you know only through a digital medium, and never reveal valuable or sensitive information to them.

Safe Computing Tip #9 – Watch What You Click

Fake URLs are a popular tool for cybercriminals. Always be sure to hover your mouse over a link in an email, or on an unfamiliar website, before clicking it. That allows you to see where it actually leads. While it may look harmless, the actual URL may show otherwise, so always look, and rarely click.

Safe Computing Tip #10 – Keep Your Programs Up To Date

Did you know that one of the most common ways that cybercriminals get into a network is through loopholes in popular software? Much of the software you rely on to get work done every day could have flaws — or “exploits” — that leave you vulnerable to security breaches.

To address this, developers regularly release software patches and updates to fix those flaws and protect users. This is why keeping your applications and systems up to date is a key part of safe computing.

Like this article? Check out the following blogs to learn more:

The Need for Cybersecurity Expertise at the Board Level for Banking

The new Health Industry Cybersecurity Practices (HICP)

NIST’s Small Business Cybersecurity Corner

 

Addressing Extended Stay-At-Home Challenges For MSPs

Webinar: Addressing Extended Stay-At-Home Challenges For MSPs Kraft Technology Group’s Don Baham recently took part in a second webinar with…

Learn more

CTI League Fights Cyber Threats During The COVID-19 Pandemic

CTI League Fights Cyber Threats During The COVID-19 Pandemic The CTI League has published its inaugural report, detailing the ongoing…

Learn more

Microsoft Teams Training Helps Boost Productivity and Collaboration

Microsoft Teams Training Due to the impact of COVID-19 and the growing practice of social distancing and working from home,…

Learn more