Monday, June 27, 2022
CybersecFill
Advertisement
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us
No Result
View All Result
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us
No Result
View All Result
CybersecFill
No Result
View All Result
Home Blog

9 Everyday Habits That Leave You Vulnerable Online

Henrietta Ijenebe by Henrietta Ijenebe
March 11, 2021
in Blog
0
Vulnerability

source:https://www.google.com/securitynewspaper.com

Share on FacebookShare on Twitter

Whether you read Email, check Social Media, or do almost anything online, your internet behavior may put you at risk. Hackers and scammers can take advantage of your online movements to get your Financial Data and other sensitive information. To stay safe and protect your identity, make sure you avoid these everyday habits that leave you vulnerable online.

1. YOU IMMEDIATELY OPEN UNFAMILIAR EMAIL.

If you don’t think twice before opening an Email (or attachment) from an unfamiliar sender, you put yourself at serious risk of phishing. Phishers are scammers who send emails containing links or attachments that, once you click on them, can trick you into revealing your login information or infect your computer with Malware or Ransomware. To make you more likely to open such emails, some phishers even make it look as though your bank or someone in your contacts list has sent the Email.

email hacked
Source:https://www.askleo.com

Be mindful before opening any unusual Emails, and pause before clicking on links or attachments that seem suspicious. Before you click on a link that appears to be from your bank, for example, go directly to your Bank’s Website or call your bank to determine if the Email is legitimate.

2. YOU OVERSHARE ON SOCIAL MEDIA.

It’s easier than ever to share details of your life, but all that Social Media sharing can leave you vulnerable to identity thieves, who can piece together the information you share to crack your passwords and answers to Security Questions. If you don’t want to make your Social Media accounts private, consider strengthening your Security settings. Disable location sharing, don’t reveal your birthday or the first concert you attended, and give a second thought to telling the world (and potential thieves) that you’re on vacation. Better to post after you’ve returned!

3. YOU REGULARLY CONNECT TO PUBLIC WI-FI.

Although you may enjoy setting up a makeshift office in a coffee shop or public space equipped with Wi-Fi, you must tread with caution. Whether they’re unsecured or secured (requiring a password), public Wi-Fi networks make it easier for hackers to see everything you do while you use the connection. If you must use public Wi-Fi, never log into Banks or Social Media Accounts, and consider using a Virtual Private Network (VPN) to protect your sensitive data.

4. YOU ACCEPT INVITATIONS TO CONNECT FROM STRANGERS.

Although online platforms offer legitimate professional networking opportunities, be wary of impulsively accepting invitations and requests from strangers. Cyberstalkers can use social networks to gain information on potential victims and send unwanted or harassing messages. Before you add a stranger to your social networks, take a good look at his or her profile and consider the risk.

5. YOU USE THE SAME PASSWORD FOR MULTIPLE ACCOUNTS.

You already know that your passwords should be strong. But besides using long combinations of random numbers, letters, and symbols, you should also make each password you use unique to that account. If you use the same password for multiple accounts, a hacker who gains access to one account also has access to your other accounts. So keep separate passwords for your Credit Card Company, Social Media Profile, and online shopping account…and change them every few months.

6. YOU FORGET TO INSTALL SECURITY AND SOFTWARE UPDATES.

The Operating Systems, Browsers, and Software Programs you use daily are vulnerable to security breaches. Thankfully, Software updates and patches address many security flaws, but hackers are continually looking for new ways to exploit weaknesses. Set up auto-updates on your Computer’s Operating System and Browser. Periodically make sure that you’re using the latest version of your antivirus software.

software update
Source:https://www.google.com/proofpoint.com

7. YOU LEAVE YOUR COMPUTER UNATTENDED.

Many hackers use sophisticated techniques to gain access to your data without your knowledge, but some criminals are more low-tech. If you regularly leave your Computer, Phone, or Tablet unattended, you put your sensitive information at risk. Even leaving your devices unattended for a few minutes—while you go to the restroom or get coffee—can leave you vulnerable. The United States Computer Emergency Readiness Team (US-CERT) recommends that you lock your Computer any time you’re away from it. Protect your computer with a password that you must enter each time you use it, and close your Laptop’s lid (or put it to sleep) when you step away from it.

8. YOU RELY ON AUTOFILL.

When you’re logging in to an account or doing online shopping, autofill and autocomplete features can save a ton of time. But storing your name, address, phone number, and Credit Card information makes your Data seriously vulnerable to Cybercriminals. Make sure you disable autofill on your browser and take the extra time to manually type in your Credit Card number each time you buy something. It may seem like a hassle now, but it’s a breeze compared to dealing with identity theft.

9. YOU OVERLOOK YOUR OLD ACCOUNTS.

Whether you have to create a Username and Password to read a random article or try a yoga class at a new studio, it’s easy to rack up a large number of online accounts. But having your name and email address—as well as phone number, address, and payment information—stored on multiple unused Accounts can put your Data at risk. Keep track of every new online account you open, and delete any accounts you no longer use. Doing so will ensure that only the Companies and Platforms that you’re active on will have access to your data.

Conclusion

It’s always better to be safe than sorry online, and that begins with staying in the know.  It won’t solve all vulnerability issues, but it’s a good first step to putting you in the know.

Tags: AccountsCrackDataEmailFinancialPasswordSecuresocial mediaUnsecureVPNVulnerable
Henrietta Ijenebe

Henrietta Ijenebe

Another Breed striving to make our cyber.space a better state of existence. CyberContent Writer at Cybersecfill. Cybersecurity Threat Intelligence Analysis... Penetration Testing... I code in Javascript...Python...PHP I convey with HTML I beautify with CSS

Next Post
How to deal with Cryptocurrency and Bitcoin FOMO

How to deal with Cryptocurrency and Bitcoin FOMO

0 0 votes
Article Rating
Login
guest
guest
0 Comments
Inline Feedbacks
View all comments
  • Trending
  • Comments
  • Latest
CEH_PRACTICAL

CEH PRACTICAL EXAM – TICKET TO CEH MASTER

February 6, 2021
Wireless Access Point

How To Secure Your Wireless Access Point (WAP)

August 3, 2019
Wifi 6 Security

Did Wi-Fi 6 come with an Improvement In Security?

May 13, 2019
credit card cloning

How Credit/Debit Cards are Cloned / Preventing Card Cloning

December 26, 2019
Nationa Cybersecurity Strategy

A Review of the Nigeria National Cybersecurity Strategy

9
Facebook

Facebook’s New Settings Allows Hackers To Easily Pentest Facebook,Instagram Mobile Applications

8
Cybersecurity Jobs

Cybersecurity Jobs – You can create your own Cybersecurity Role

4
open Source intelligence tools

Open Source Intelligence tools – OSINT

4
Suspected Head of Cybercrime Gang Arrested in Nigeria…

Suspected Head of Cybercrime Gang Arrested in Nigeria…

June 17, 2022
Types of Hackers and Hacking Protection Tips….

Types of Hackers and Hacking Protection Tips….

June 6, 2022
Types of Hackers and Hacking Protection Tips…

Types of Hackers and Hacking Protection Tips…

May 31, 2022
Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

May 19, 2022

Recommended

Suspected Head of Cybercrime Gang Arrested in Nigeria…

Suspected Head of Cybercrime Gang Arrested in Nigeria…

June 17, 2022
Types of Hackers and Hacking Protection Tips….

Types of Hackers and Hacking Protection Tips….

June 6, 2022
Types of Hackers and Hacking Protection Tips…

Types of Hackers and Hacking Protection Tips…

May 31, 2022
Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

Sports Betting…Increase in Cybersecurity and Data Privacy Risks for Companies and Consumers.

May 19, 2022

© 2020 CybersecFill. All Rights Reserved.

No Result
View All Result
  • Home
  • Events
  • News
  • security tips
  • Article
  • Contact Us

© 2020 CybersecFill. All Rights Reserved.

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply

Privacy Policy - Terms and Conditions