10 Simple Steps for Internet Safety and Online Privacy

Cyber Safety Tips

With the amount of media attention given to internet safety, you’d think it wouldn’t take much convincing to get people everywhere to pay more attention to their online habits.

So here’s the big question for you: Are you convinced yet that you need an internet safety plan and routine? You should be.

Corporations are reporting cyber security breaches annually, and unless you were literally born yesterday, most people’s information has already been compromised at some point in time. With some projections estimating that cybercrime costs will rise to $6 trillion annually by the year 2021, it certainly deserves your attention.

The truth is, hackers assume that the general public is lazy. They know it takes time and effort to manage passwords and watch financial information, and they are counting on the fact that most people won’t do it.

Internet safety advice may seem over-exaggerated to you, but if billionaire Warren Buffett thinks it’s the number one threat to mankind, you probably should too.

So, where should you begin?

Here is a great list of the top cybersecurity tips to start using. Follow this advice, and you’ll boost your online security immediately:

Give your passwords the attention they deserve

Would you trust Velcro to secure the doors of your home every night? Then you shouldn’t trust old, simple passwords either. Not only is it essential to have complex passwords (without any duplicates or variations), it is also important to change them frequently. Almost every cyber crime security expert in the world will say that one of the first and greatest (and easiest!) steps you can take in your own security is to get a password manager. Not only can they let you know if any of your account passwords have been compromised, but they will help you change them as frequently as necessary to new, complex passwords. And don’t worry about losing your auto-fill functions: they offer those, too.

Discover and Use Two-Step Verification

Another password-related tip is something that many popular sites offer (though you may have to search in your security settings for it). Two-step verification—also known as two-factor authentication—adds an extra level of security by request a confirmation code for login. These codes are usually sent through text, voice call, or mobile app, and unless your hacker has your phone too, you should be safe.

Check Your Virus Protection

Though most computers these days come with built-in security, risks continue to increase as hackers grow smarter and allow programs to find vulnerabilities in thousands of computers at a time. Virus protection companies (some with paid subscriptions and some free) specialize in these fields and can keep your computer as safe as possible. Just make sure the company you choose is verified and trusted so that the new “virus protection” you just downloaded isn’t actually installing malware on your computer.

Avoid All Suspicious Emails

Typically most email companies are already scanning the emails you receive and send the suspicious ones to a spam folder. But just in case one gets through, make sure to NEVER click a link in an email from an untrusted source or unsolicited email. If you’re concerned it might actually be a company you use (like a bank), it’s safer to call them directly and verify.

Be Unsecured Wi-Fi Wary

Sure, it may save your data if you access that free Wi-Fi, but it will also make you vulnerable to hackers that stalk free Wi-Fi hubs like sharks around Amity Island. Using a VPN (Virtual Private Network) is your safest option, and even using your data is safer than public Wi-Fi. Regardless, never log in to important accounts (banking, healthcare, etc.) when you are not on a secure network.

Install All Software Updates

The pre-loaded software safety settings on your devices will obviously work best as new updates are made. Make sure to consistently update your devices to have the most recent versions of those safeguards.

Back Up Your Files

If information on your computer (or your computer itself) is ever stolen, you will want to be sure you still have access to those important files and documents. Using an external hard drive, the cloud, or other subscriptions that allow you to back up the files from your computer will ensure that you have that access no matter what.

Shop Only on Secure Websites

Now that online shopping is the norm for a vast majority of people, hackers and other cybercrime specialists know they can get banking information easier than ever. If you are on any site requesting sensitive information, make sure it is a secure website—typically identified by a web address beginning with https:// with a lock symbol next to it.

Make Your Social Media Accounts Private

To use most social media accounts, you need only to provide basic information. Try to avoid giving more than the essentials (name, email address, password) and make sure all your accounts are set to private so that only friends can see your profile and activity. Many con artists research the individuals they are going to go after, so the less information available, the better. Similarly, wait until after your vacation to make those posts—otherwise you are essentially advertising that your home is empty and unguarded.

Cover Your Webcams—And Yourself

Who knows if someone is actually using your laptop or computer’s webcam to spy on you, but it certainly wouldn’t be good to find out the hard way. This is one of the simpler items on the list, so take the ten seconds to do so and remember to close your laptop when you’re not using it. Better safe than sorry!

Snap into action.

With hackers getting smarter (and more devious) every year, there’s no time like the present to turn these suggestions into regular security practices. Make a commitment to tackle one or two of these tips every week or two. Before you know it, you’ll have significantly boosted your Internet security profile.

And that will be a hacker’s worst nightmare.

Picture of <span>About The Author</span>Chris Parker

About The AuthorChris Parker

Chris Parker is the founder of WhatIsMyIPAddress.com, one of the world’s most popular websites for online privacy and security with over 13 million monthly visitors. He is also the host of the Easy Prey podcast, where he interviews experts and survivors to uncover the tactics behind scams, fraud, and digital manipulation. Chris is the author of Privacy Crisis: How to Maintain Your Privacy Without Becoming a Hermit, a practical guide to protecting personal information in today’s surveillance-driven world. His work has been featured on ABC News and numerous podcasts, making him a trusted voice on how to stay safe, secure, and private online.
Share Post:

INSIGHTS YOU

MAY ALSO LIKE

You play a role in preventing social engineering. So, just what is social engineering? It’s a vague term that’s used for online shenanigans and…

If you think that only your Internet Service Provider (ISP), such as Cox Cable or Verizon, knows your IP address, think again. (Your IP…

This post was moved over from an old blog of mine that I’ve since taken down. Several years ago I purchased an APC AP9630…

WHAT PEOPLE SAY

ABOUT CHRIS

DOWNLOAD CHRIS’ BOOK

PRIVACY CRISIS

DOWNLOAD YOUR FREE PDF, MP3, and workbook by entering your details below.

We respect your privacy. 

Don’t want to share your email?

Privacy Policy

This following document sets forth the Privacy Policy for this website.

Collection of your personal information

We collect Non-Personally Identifiable Information from visitors to this Website. Non-Personally Identifiable Information is information that cannot by itself be used to identify a particular person or entity, and may include your IP host address, pages viewed, browser type, Internet browsing and usage habits, advertisements that you click on, Internet Service Provider, domain name, the time/date of your visit to this Website, the referring URL and your computer’s operating system.

Free offers & opt-ins

Participation in providing your email address in return for an offer from this site is completely voluntary and the user therefore has a choice whether or not to disclose your information. You may unsubscribe at any time so that you will not receive future emails.

Sharing of your personal information

Your personal information that we collect as a result of you purchasing our products & services, will NOT be shared with any third party, nor will it be used for unsolicited email marketing or spam. We may send you occasional marketing material in relation to our design services.

What Information Do We Collect?

If you choose to correspond with us through email, we may retain the content of your email messages together with your email address and our responses.

Cookie Based Marketing

Some of our advertising campaigns may track users across different websites for the purpose of displaying advertising. We do not know which specific website are used in these campaigns, but you should assume tracking occurs, and if this is an issue you should turn-off third party cookies in your web browser.

How Do We Use Information We Collect from Cookies?

As you visit and browse Our Website, the Our Website uses cookies to differentiate you from other users. In some cases, we also use cookies to prevent you from having to log in more than is necessary for security. Cookies, in conjunction with our web server log files or pixels, allow us to calculate the aggregate number of people visiting Our Website and which parts of the site are most popular.

This helps us gather feedback to constantly improve Our Website and better serve our clients. Cookies and pixels do not allow us to gather any personal information about you and we do not intentionally store any personal information that your browser provided to us in your cookies.

IP Addresses

P addresses are used by your computer every time you are connected to the Internet. Your IP address is a number that is used by computers on the network to identify your computer. IP addresses are automatically collected by our web server as part of demographic and profile data known as traffic data so that data (such as the Web pages you request) can be sent to you.

Sharing and Selling Information

We do not share, sell, lend or lease any of the information that uniquely identify a subscriber (such as email addresses or personal details) with anyone except to the extent it is necessary to process transactions or provide Services that you have requested.

How Can You Access and Correct Your Information?

You may request access to all your personally identifiable information that we collect online and maintain in our database by using our contact page form.

Changes to this Privacy Policy

We reserve the right to make amendments to this Privacy Policy at any time. If you have objections to the Privacy Policy, you should not access or use this website. You may contact us at any time with regards to this privacy policy.