No Comments

Top 7 Internet Safety Rules 

Internet Safety Rules 

As more and more people hop onto the internet, so does the inherent risk in using it. There are an increasing number of ransomware attacks out there. But what can you do about it? What kind of things should you do, to avoid them? Learn the Top 7 Internet Safety Rules. Secure yourself as well as you close ones from all the internet problems and issues with this guide. 

In this article, I’ve outlined 7 rules that just about anyone using the internet should know:

Internet Safety Rules 

  • Be Careful When Opening Email Attachments

This threat is fairly common and manifests itself very similar to your common phishing scam. Essentially, you receive an email from a hacker that contains an attachment. 

This hacker could have sent you an email that resembles a legitimate company or a friend, just to encourage you to open the attachment, and when you do, a script is automatically run on your system. 

Such scripts are designed to do just about anything, from erasing integral system files, to copying sensitive data to the hacker’s machine. In more severe circumstances, it could even lock you out of your computer. For that reason, it’s important you pay a great deal of attention to whatever you download to your computer. 

  • Ensure Your Software Is Up-To-Date

One of the more effective ways you can protect your computer and the data on it, is by ensuring all installed apps are up-to-date. This may include the operating system, internet browser and the various extensions and plugins installed on it. 

New security vulnerabilities are discovered all the time, and when they are, hackers will look at ways they can exploit it. A software developer will respond by releasing a patch to plug it up. You need to ensure you’ve downloaded and installed it. 

  • Watch Out For Phishing Scams

One of the more common ways hackers will try to steal information from you is through phishing scams. The typical phishing scam is usually sent in the form of an email that resembles a legitimate company, such as a bank.

This message will contain a link to the hacker’s website, where they will proceed to ask you for your confidential data. Once you click on send (in the form), your data is sent to the hackers system. 

  • Avoid Suspicious Pop-Ups in Websites

Any one of these pop-ups could have malware in it, with the hackers deploying all kinds of tactics to get you to click on them. 

In some instances the pop-up may contain a fake close button, which the user mistakenly clicks on. However, when they do, a malicious file may be sent to the user’s machine. 

The pop-ups and ads you should be most mindful of, are those that appear in the most unusual locations and unexpected times. To do this, you should go to your security settings on your web browser. Most internet browsers block pop-ups by default, however, you should be able to up your security level. So that it will block just about everything, including cookies and other things that are used to track you. 

  • Don’t Give Out Personal Affix

When considering your personal affix, it’s important that you’re cautious about what you choose to sign up to. Many companies like to sell your data. If this is the case, then it will be contained in their terms & conditions or privacy policy, so you may want to read it – because once you click on accept, you allow them to collect and sell your data to third parties, which advertisers will use find out as much about you, from where you shop, to where you work, to where you live. 

There are however ways you can avoid this from happening, from setting your browser to denying websites and apps access to your microphone (just for listening sake) or geo location.

So, what should you do? You should take a little bit of time to read over the terms & conditions and privacy policy of any service you have interest in signing up to. This obviously will take some time, but in the long run, it will ensure no one, you don’t want to have your data, gets your data. 

  • Don’t Download Unknown Apps

One way you can secure a toddlers device is by preventing it from downloading unknown apps without permission from you. Another thing you can and should do, is offer advice on the types of things they should download, and those they would rather best avoid. 

There are tons of fake apps out there that are spam with many unsuspecting internet users out there, who may end up downloading it, only to be infected with a virus. You want to get into the groove of knowing what you can and cannot download, and also consider the source. Downloading from trusted sources is also important, with site advisors out there, to help you determine whether or not a site is appropriate for you. 

  • Avoid HTTP Websites

HTTP is the original protocol for websites. Through this, a browser is able to make requests to a server for a specific site. However, one of the main issues with this protocol is its basis, which is plain text – essentially, containing no encryption. 

Considering that, just about any one sitting between the server and client computer could intercept and manipulate this data, whether sent by the server or client machine. 

Many hackers like to take advantage of this to issue fake transactions which may involve sensitive data or money. The workaround is to use HTTPS, which is the HTTP protocol coupled with security principles, which adds authentication, confidentiality and integrity.

So for your part, you’ll want to ensure you’re always paying attention to the URL of any site you visit. Especially sites that involve finance or your personal affix. If you see HTTP (without the S), then it’s probably best you avoid it. 

All HTTP sites are insecure, and thus, do not offer any kind of protection when communicating. When you decide to visit a HTTP site, all information that you choose to share, such as your credit card number or login info, can very easily be stolen by a hacker. 

However, when it comes to HTTPS sites (which contain the SSL – secure sockets layer or TLS – Transport layer security) the data is encrypted during communication. This provides an additional layer of security for your sensitive data. For this reason, it’s always best to go with a HTTPS site, whenever you get the chance, as this is the only real way you can protect yourself, while purchasing something online, for example. 

AUTHOR INFO

Uchenna Ani-Okoye is a former IT Manager who now runs his own computer support website compuchenna.co.uk

 

You might also like
Tags: ,

More Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.
You need to agree with the terms to proceed