Home Global How to avoid online risks: simple steps to be safer online

How to avoid online risks: simple steps to be safer online

0
1190
Impact-Site-Verification: 6d2ed81c-c4e7-42f2-9cea-ea816e4ce24a

How to avoid online risks: simple steps to be safer online

Here are simple steps to avoid online risks

  1. Use a strong password: Too often, people pick weak passwords for their devices. They use their birth year, the name of their kids or their family members. All these could be pretty easy for someone to guess. When choosing passwords, make it as hard to guess as possible. Aim for a mix of uppercase and lowercase characters, numbers and symbols.

If possible, try to be creative- think beyond a word, phrase or sequence of numbers. For example, passwords like gKY2d19@Gb.

strong password, password, security risks2. Two (2) Step verification: For an extra layer of security, you can enable 2 step verification for your accounts. This form of authentication is strong as it requires only you to know your password and the multi digit code sent to your phone via SMS. This will help you especially if your device gets stolen.

authentication app, Google authentication, facebook, online safetyFor example, in Facebook, there are additional 2 step verification you can choose. It has the option of sending you a code through a text message. it also has the option of 10 recovery codes which can be used once but you can still request for new codes.  it also has an advanced security back up by using a registered security key which could come through Bluetooth, NFC, USB and device screen lock.

Incase you want an advanced security back up especially when you are not sure of the security of you getting a text message code safely to your phone or in case where your phone was stolen, we recommend you go for Authentication app. You can use it on the same device or on another device. So far, Google Authentication app is the best. Download the app and enter the code or scan the QR Code Facebook generates into the authentication app and you are good to go. it will be difficult for any hacker to ever access your account.

3. Enable Screen Lock on your Devices: This is why it is important to have a screen lock on all your deices. Lock your phone, computers and all your devices when you are not using them whether its with a password, pin, pattern.

screen lock by daily mail, online safety, screen lock

In some cases, your phone was stolen, use Google search or Google Play Store, ‘Find your phone’ from another device to check the location of your stolen phone. You could lock it, or send a message to the person who stole the phone to kindly return it. You could ring the person loud and you could delete all your data remotely.

google find your phone, screen lock
Google find your phone

After your phone gets stolen, you have to be careful about messages you receive especially messages from your bank, confirming a payment or transaction. You must be able to know that is ‘Phishing’ 

4. Try to Update Windows and Necessary Software

Sometimes you could be browsing online and you could get an alert from the computer that says, ‘your computer is infected, click here to fix it.’ This could be a scam technique.

Although, not all alerts are scams. Those frequent alerts that ask you to update your device software and operating systems may seem annoying especially with the delay it usually takes, but often these updates patch holes in security. Because of these, scammers tend to target people who have not updated their devices.

importance of app updateAnother could come as a pop-up ad on a website which could look like a regular computer alert which may frighten you to take quick action without thinking. This can lead to your information being stolen or being scammed into paying for things you don’t need. In this case, you can use pop- up blocker on Google Chrome which can help stop these harmful ads. Additionally, you can periodically scan your device for infections by using trusted anti-virus software’s like Norton, Avast, Kaspersky etc.)

 

5. App Permission: Before you install an app to any device, the app will request permission to access certain data (like location, friend list, contact) or capabilities like (camera, voice).

Before you download, Google play will show you everything an app will be able to access, which can help you decide whether or not you want to install the app. Look over these permissions and make sure they make sense for that particular app. You can allow or deny individual permission request if you are not sure of the app.

For example, if I download a sound app for my dog and the app is requesting to access my contacts, it is wrong and unsafe to give such permission. Why would a sound app request to access my contacts? Beware of app in Play store especially gaming apps which have some scam interest.

If you are getting to read this, you can go through permission in your apps on your devices that you have downloaded already and allow or deny the ones you don’t think it’s necessary to protect you from scammers or apps with scamming interests.

 

6. Update App: Safety doesn’t stop once you have downloaded an app. It is important to keep your apps updated, especially ones that hold personal or financial data. Some apps update their security patch which would also be beneficial for the users too.

App developers make updates to stay ahead of security concerns and fix little things that might be broken. By keeping apps up to date, you ensure you’re using the most secure version.

 

7. Malware and viruses: Another way someone could steal your data and personal information or damage your computer is through viruses. This comes from opening attachments or links from unknown emails or ones that have been ‘spoofed’ to look like they’re coming from a trusted source or even by clicking on malicious online ads and downloading software.

Try and get the Google Play Protect on your phone. It will help keep your devices safe.

malwares and viruses
malwares and viruses by Cso online

8. Public Wi-Fi: No matter how economical you may be, never use public Wi-Fi e.g. (Hotel Wi-Fi etc.) on your devices. The worst is when you use it to log into your social media accounts or bank transactions, making purchase or sending sensitive information because it can be more easily intercepted.  Although, some people believe that networks with passwords are safer. With passwords, only those who are authorized can access the network, making it harder for semen to intercept personal data. Nevertheless, to be on the safer side, don’t do anything serious with public Wi-Fi. You may want to How to stay safe on public wifi

dangers of public wifi, bad wifi, online security
Public Wi-Fi by Cloudwards

9. Creating WIFI for Customers

When creating your own Wi-Fi, use a strong password and try to change it periodically. If you are a business owner that likes to offer customers access to Wi-Fi, then consider having one Wi-Fi network for customers and another for employees to use for payments, transactions and other important work.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.