Big day; our first guest contribution! Johann Bergh, a professional translator and recovering software developer put together this list of 10 ways how you can be proactive and outsmart cyber criminals. Enjoy, and take action!
Information is key to the success of cyber criminals. It is the driver that enables them to destroy, steal and extort. Cyber criminals are great detectives. They unite scraps of information from various sources into a nefarious plan. “Whatís the big deal?”, you may ask. You are the big deal, because you could be their next target. Your online presence puts you at risk. Reducing your personal online content is an important weapon in the fight against cyber criminals.
1. Social media Ė you donít have to be famous
We all love social media. Posting cool pictures of yourself in weird and wonderful places, complemented by exotic people in the same photo frame. And itís so much fun browsing the photos (and the latest gossip news) of family and friends. Beware! The information that you post online is a treasure trove for foreign governments and cyber criminals alike. Be selective with what you share. If you took 100 photos of a weekend outing, select 3 or 4 appropriate pictures and be cognisant of the comments that you add. Too much information gives would-be identity thieves a foot hole 1. Most social media platforms have privacy and security settings. Be sure to tighten them. You donít want everything to be available to the whole world!
2. Minimize online accounts
Letís be honest. The average person has accounts on more websites than they care to remember. Unfortunately, many sites only give access to their resources after you have created an account, resulting in an explosion of your digital footprint. In the world of cyber security, more information is bad news 5. How can you reign in your online omniscience? Make an inventory of all the online accounts that you have. Your email inbox might be able to give you some hints if you have forgotten. Log into the accounts and delete them if they have fallen into disuse. If you are unable to delete the account, remove as much sensitive information as you can.
3. Clean up your PC
Did you know that your PCís hard drive contains documents with very personal and sensitive information? When is the last time that you cleaned up your files? Cyber criminals love information. Financial and personal information are very valuable to them.
How much is the information on your PC worth to you? Intruders can install ransomware 2 on your PC. The result is that all your files are encrypted, and you wonít be able to access it again unless you pay a ransom to the intruder. Delete unimportant files and move unused files with valuable data to an external hard drive (or to the cloud). Ransomware? No problem, reformat and start afresh.
4. Where are all my passwords?
There are so many websites that you sign up for and you donít want to create a unique password for each of them. So you just reuse the same password across all of the sites. No problem, right? Wrong! Big problem 4.
Consider the following scenario. John creates an account on website X but decides to use the same password as his email website because itís easier to remember. Unfortunately, website X doesnít have the same security measures as Johnís email provider. Cyber criminals can easily get Johnís email address and the password that he used to sign into website X. The cyber criminals go to Johnís email website and try to log in with the password John used on website X. And low and behold; they have access to Johnís email inbox!
Luckily, there are many free password managers that you can use to generate random passwords for different sites. Download a password manager and make use of it.
5. Donít be the weakest link, keep yourself updated
Cyber criminals, like pick-pockets, tend to prey on easy targets. Do you have virus protection and is it enabled? Is all your software up to date? Outdated software poses a significant risk 6. It is not uncommon for software packages to release patches on a weekly basis, and there is reason why they call some of these patches “security patches.” Enable automatic updates for all your installed software. These basic steps are easy to follow. Donít become the weakest link!
6. Avoid the seedy places on the web
Watching the latest series? You didnít get it from a torrent site. Or did you? Files downloaded from torrent sites often include a nasty surprise: malware 7. Software, with malicious intent, that will be installed on your PC without your consent. You are potentially giving cyber criminals access to your files and computing resources. Itís a blank check. Theyíre having a field day. Torrent sites arenít the only dubious, dark corners of the web. Porn sites and online gambling platforms are notorious contenders, inter alia.
7. They are watching you Ė donít get tracked
Tracking, tracking, tracking. Online advertising is big business, and you might not be aware that everything you do on the web is tracked and analyzed. Most websites that you visit store a small file on your computerís hard drive called a “cookie”. These are often used to track your browsing activities for online advertising purposes. More information is available about you. It could give cyber criminals some valuable insights. Browsers have privacy and security settings that you could tighten to minimize tracking 3. Browsers also have several plugins on offer that can help thwart tracking efforts by third parties. Eat the cookie before it eats you!
8. Choose your friends carefully
The internet is a great place to meet new people. Online friendships and romances are commonplace in the modern era of the internet.
However, not all people using the internet are well-intentioned 9. The good news is that there are a few basic considerations that will shield you from internet fraudsters. Donít reply to dubious Emails. Messages donít go to your spam folder without reason. Maybe you are love sick. Do your research and join a reputable online dating site and you will meet plenty of like-minded individuals.
9. Donít leave a paper trail
Despite all the propaganda about saving trees, hard copies of documents are more pervasive than ever. The information on physical documents is just as valuable as the information on digital documents.
Dumpster divers are not only fictional characters that you see in the movies. They exist in the real world 8. How many hard copies of documents with sensitive information do you have? Maybe itís time for a spring-clean. Consider investing in a paper shredder, if you like working with hard copies.
10. Physical security
Physical security? What does that have to do with keeping cyber criminals at bay? The answer is simple: Grabbing a laptop is the easiest way to make a quick buck and get free access to juicy information 10.
It goes without saying that you shouldnít leave your electronic devices unattended in public areas. Laptop bags also tend to attract maliciously inclined individuals. A nifty trick is to get a backpack that has a laptop compartment. It will keep the criminals guessing.