Online Security Best Practices
I have been studying cybersecurity for a couple of months and I have learned a lot about what hackers and scammers are doing to steal information and money from people and businesses. I have also talked with dozens of people who have been scammed and I am disgusted at what these fraudsters are doing to unsuspecting people.
Here are some things I have learned that can help you stay safer and more secure online. This list is not all-inclusive and there are new forms of attacks coming out all the time. One new thing to think about is Voice Impersonation. You may not be able to trust the voice on the other side of the phone even if it sounds like your son or daughter or cousin. Scammers are getting more and more sophisticated all the time so beware.
If you think, “It won’t happen to me” or “No one cares about me”,
YOU’RE WRONG!
If you have a bank account then you have something to steal. Do you work for someone? Then you have information someone wants to steal. Are you on the internet? Then you are on a network and might be a way to get to someone else’s information. The following is a list of best practices to keep in mind:
Keep your system up to date.
Don’t use old operating systems (OS) that are not supported. Don’t use any Windows OS below Win 10.
Check for updates and let the system update when prompted. This allows the system to install new security updates that address known security vulnerabilities.
Check for updates to software you use as these don’t always tell you when there are new patches and do not always update automatically.
Don’t trust communications telling you to take action if you didn’t initiate the interaction.
If you get a message saying to call someone like Microsoft or anyone else DO NOT call the number on the screen or on your phone.
Don’t talk to people calling you saying that they are there to help you. They are likely there to scam you.
Don’t let someone remotely control your device unless you know for sure who they are!
Programs to look out for are ANYDESK or TEAMVIEWER
Watch out for calls from weird numbers even if it sounds like someone you know. Soon Artificial Intelligence technologies will be able to mimic voices in a way that will be very difficult to distinguish from the real thing. Check the number or call the right number after hanging up.
Verify, Verify, Verify!
Don’t believe any message on your computer or phone that says there is an emergency and they need you to call them or fill out a form. This is almost always a scam. If you are concerned go to the source directly.
Watch out for gift cards! (or Bitcoin)
If someone wants you to pay in Gift Cards then it is a scam. Gift cards are almost impossible to track and are an easy way to exchange value. Don’t trust anyone asking you to go get gift cards to pay them.
Don’t open emails from anyone that you didn’t expect an email from. Also, don’t download anything from an email, site, text message, or anywhere else if you’re not sure who and why it is sent to you. Don’t scan QR codes on emails unless you trust the source.
Check out these websites related to phishing.
Set up multi-factor authentication anywhere it is offered. This involves things like adding a one-time passcode sent by text or phone along with your password or adding a fingerprint or face recognition when logging into something. If a bad guy needs more than a static password then it is much more difficult to break into your device.
Get a VPN for your devices. This will help with privacy and not really security. You are still vulnerable if you have weak passwords download something or allow someone control of your computer.
Don’t use public wifi. Public wifi is not secure and anyone on that network can try to access your devices.
If you have a VPN on your device then public wifi is less risky but still not ideal.
Don’t use default passwords on things like routers or smart devices.
Default passwords can typically be looked up online.
Use strong and complex passwords. Try not to use simple word-based passwords as these are the first things that hackers will try when trying to crack your password. They have lists of commonly used passwords and can use software to try thousands of passwords from these lists.
Using a reputable password manager is a great way to create, organize, and store your passwords. This way you don’t have to remember all your complicated passwords. You only need to remember the main password for the account. Obviously, you should make this a strong password. I use LastPass because it integrates into Chrome but look into it yourself as LastPass is still vulnerable to hacks as is any web service.
Check out these websites and see how long it might take to crack your password based on its length and complexity.
Be aware of openly available information about you online. (IE: Social Media)
Hackers can use photos to see things in the background to identify you or things you have.
Examples include ID badges, artwork, expensive items worth stealing, lists, passwords or codes in the photos, reflections of things you don’t notice, etc…
Hackers can use your activities and locations to track when you are away from home, where you work, or who your friends are. They can use this to take advantage or impersonate someone.
Hackers can use this information to appeal to things you enjoy.
If they know you’re into woodworking they might send you an email that appeals to this interest and seems like a legitimate offer but is actually a malicious email.
Additional Resources
https://www.youtube.com/@ScammerPayback
https://www.cisa.gov/news-events/news/using-caution-usb-drives
Blogs:
https://academic.oup.com/cybersecurity
Podcasts: