Top 10 Cybersecurity routines to follow to be safe online.
1. Install appropriate protection software
Ensure that you install anti-virus and anti-spyware purchased from trusted retailers. These protect your devices against malicious programs.
2. Keep your operating system and software applications up-to-date
Make sure that your operating system and software applications are up to date as this helps to guard against latest security threats
3. Practice good password management
Create strong and unique passwords for each internet log-in identity and for your mobile devices. This can be achieved by creating passwords containing letters, numbers, and symbols. Also, change your password regularly.
Use a password manager to remember your passwords for you. This will allow to use unique passwords for every site or service. For more information on password managers, see password managers.
4. Emails or attachments that seems suspicious should be deleted or marked as spam
These attachments could infect your computer with virus or spyware
5. Connect to secured WiFi
Wi-Fi networks in public places can be risky and make your data/information vulnerable to being intercepted. Make sure you use a secure connection when making purchases or doing banking transactions online.
6. Clear your cache
Website addresses are stored in the cache of your browser when you visit websites. It is important to clear the cache of your browser after visiting secure sites so no one can view any confidential information about you.
7. Regularly back up your data
Backup your files frequently to an external drive or cloud-based storage that is not linked to your computer.
8. Disable file sharing networks
File sharing networks often called “Peer-to-Peer” (P2P) popularly used to upload and download music, movies, games, documents etc are prone to attacks from hackers. This is because these networks are sometimes used by criminals to distribute illegal files and viruses and are disguised to look like legitimate downloads of popular songs, movies etc.
9. Review your internet contacts and online activities
This is to ensure that all your accounts have only been used/accessed by you.
10. Protect your home network
Always take extra precaution when setting up your home networks to connect your devices.
Published on and maintained in Cascade.