10 most dangerous security habits

The 10 worst security habits

Security habits-2021 has been one of the most profitable years for cybercriminals so far. Nearly 19 billion records were disclosed in just the first half of last year. As we start the new year, we need to review our digital life and make new decisions. Experts have identified 10 habits regarding cybersecurity that need to be changed.

A good sense of security means a reduced risk of identity fraud and financial loss. The cost of these scams reached $56 billion in 2020, and most of the scams took place online. To understand the scale of the problem, data from the US Identity Theft Information Center needs to be considered. According to data, one-third of identity theft victims in the US say they don’t have enough money to buy food or pay bills due to fraud. In 2022, ESET experts recommend increasing cyber hygiene and being careful, and quitting the 10 bad habits shared below;

Using outdated software

Vulnerabilities in operating systems, browsers, and other software on your computer and devices are the best places for cybercriminals to attack. When you enable the auto-update function and confirm the update when prompted, this issue does not interfere with your daily life too much.

Weak password security habits

security habits

Passwords are the keys to the door to our digital world. Unfortunately, we don’t use them securely enough these days because we have so many passwords to remember. Using the same password and easy-to-guess login credentials for multiple accounts gives hackers a huge advantage. Using the software, these attackers crack weak encryptions, try common variants, and try to use the hacked passwords on other accounts. Instead, use a password manager to remember strong and unique passwords or login keys. Also, switch to two-factor authentication (2FA) on all accounts where possible.

Using a public Wi-Fi network

public Wi-Fi network

We’re starting to go out more these days. Therefore, public Wi-Fi networks are used more. However, this is a risky issue. Hackers can use the same networks to learn about your internet usage, gain access to your accounts, and steal your identity. To be safe, you should avoid using these access points in public areas. Do not log into your important accounts while connected to the public network, in case you have to use a public Wi-Fi network.

Not thinking before clicking

Phishing is one of the most profitable types of scam. A technique known as social engineering is used. In social engineering, attackers try to trick their victims into clicking a malicious link or opening an attachment with malware. They take advantage of our good-hearted feelings and try to get us to make a quick decision with messages about an emergency. The most important rule we must follow to defend ourselves from these attacks is not to click without thinking. Double-check the sender or company to make sure the incoming email is genuine. Don’t act in rush.

Not using security on all devices

In an age of revenue-generating cyber threats, you should use malware protection from a reputable provider on your computers and mobile devices. But how many of us use security software on our mobile devices and tablets alike? According to research, we use these devices for almost 5,000 hours each year. During this time, we are likely to encounter malicious apps and websites. Secure your device immediately.

Using unsafe websites

HTTPS sites use encryption to protect traffic from your web browser to the site you entered. This has two purposes. To verify that the website is genuine and not a phishing or fraudulent website; ensuring that cybercriminals do not spy on your communications to steal your passwords and financial information. This isn’t a 100 percent guarantee as many phishing sites use HTTPS these days, but it’s a good start. Always pay attention to the lock symbol and make sure it is there.

Sharing your work and private life online.

Most of us have lived for most of the last two years in a way where the sharp line separating our work and private lives has disappeared, and the two sides have become entangled. As this line blurs, so do cyber risks increase. Consider the use of business emails and passwords to log into shopping and other sites. What happens if data on these sites is compromised? Hackers can take over your corporate accounts. The use of personal devices that are not safe for work also increases the risk. You should make an extra effort to keep your work and private life separate.

Sharing your information on the phone

cybersecurity habits

voice phishing uses social engineering to trick users into clicking something, as does email and SMS-based phishing theft. It is an increasingly popular way to obtain victims’ personal and financial information. Scammers often hide the real number to make the scam look like real communication. The rule of thumb is not to share any sensitive information on the phone. Depending on who they are and where they’re calling from, check the information by calling the company directly without using the caller’s number.

Not backing up your data

Ransomware costs companies hundreds of millions of dollars each year. So, we sometimes forget that there are many variants waiting for consumers. Imagine that your home computer suddenly locks. All data on your computer and possibly cloud storage can be lost forever, including family photos and important business documents. Regular backups give you peace of mind in case you run into bad situations like these.

Not protecting your smartphone

Almost a third of homes in Europe are equipped with electronic devices such as voice assistants, smart televisions, and security cameras. But the connectivity and machine intelligence they provide also make these devices an attractive target for criminals. They can be hijacked to turn them into botnets to attack others, or they can be used to gain access to other devices and data. To keep these devices secure, change the initial default passwords.

Also, be sure to choose vendors that have a track record of fixing known vulnerabilities in their products and research potential vulnerabilities before purchasing an electronic device.

How Metaverse Will Change Humanity’s Future?

Comments

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Advertisement

Most Popular

redmi note 10

Redmi Note 10 [mojito/sunny] nv data is corrupted fix

1
Nv data is corrupted fix When the IMEI number of the Redmi Note 10 phone is changed, there will be changes in the modem partition of the phone. When you install a new update to...
e025f test point

Galaxy F02s SM-E025F/DS test point

1
SM-E025F/DS test point edl mode is for phones with Qualcomm processors. The Samsung e025f has a Qualcomm Snapdragon 450 processor. We can put the SM-E025F in edl mode with the following test points. For this operation, you...

Redmi Note 8 (ginkgo) ENG Firmware All Board ID

0
Redmi Note 8 (ginkgo) This is a Redmi note 8 eng firmware supporting all board ids. 1.29 , 2.XX , 3.XXBoard id 1.29 tested. Didn't get a chance to try other board ids. Update 14.11.2021 for...
xperia flash tool

Xperia Flash Tool 0.9.34.0 latest

0
Xperia Flash The Sony Xperia Flash Tool allows you to perform actions that the Sony Xperia Companion program does not allow, such as downloading and installing ROMs, unlocking bootloader, etc. As a user of Sony...
nck pro

NCK Pro Spreadtrum Module v2.0

0
NCK Pro Spreadtrum Nck Pro dongle Spreadtrum's new version is released. Many new features have been added to this version. Here are the new functions added. Nokia - EXCLUSIVE   Boot info, backup/restore NVRAM, read user code, write...

Ads