Enhance your online safety with Innokrea – don’t let yourself be robbed (part 3)

Author Author:
Innokrea Team
Date of publication: 2023-08-10
Caterogies: Security

If after the first two parts of our guide (part 1 & part 2) you are still unsatisfied, that’s great, because we have another portion of cybersecurity recommendations for you. We invite you to read tips number 21-30!

  

21. Do not use public or other people’s computers to log in to your accounts.

Using public or other people’s computers can be risky because the security of such a device or network cannot be guaranteed. Other users may install malicious software such as keyloggers. Furthermore, public computers may not have up-to-date software, which can increase the risk of using such a device. Multi-factor authentication can protect you to some extent in such a case, if you do not add the device to trusted devices within the given application. However, we strongly recommend using only trusted and secure devices, such as your own personal computer or mobile device, to log in to your accounts.

 

22. Do not react emotionally to what you see on the Internet. Scammers often try to make you want to earn easy money or try to scare you.

Scammers often use manipulative techniques to make people believe in their false claims by acting on emotions. They may try to create a sense of urgency or unavailability of a product to force you to make a hasty decision. They may also try to create fear through blackmail to extort money or personal data from you. It is important to remain calm and rational while browsing the Internet, especially in the case of offers that seem too good to be true or stressful situations like a phone call from the bank that your funds are at risk. Look closely at the information and verify its source before taking any action. If you have any doubts or suspicions, it is always worth seeking advice from a trusted person, preferably an Internet security expert.

 

23. Consult actions with a trusted friend who is an IT expert before opening suspicious messages, installing software or in other threats.

Before opening suspicious messages or emails and before installing software on your computer or device, you should consult this action with a trusted IT specialist. It is important to be cautious about online communication and software installation because cyber threats can cause serious damage and data loss.

 

24. Consider your security needs and consult with a specialist. If you hold a high-profile position, your needs and risks will be completely different from an average person.

The required level of security may depend on many different factors, such as the type of work performed or the level of sensitivity of the processed information. For example, a person who works with confidential information or in a high-risk environment may require additional security measures or procedures. By consulting with a security specialist, individuals can identify their specific needs and develop a personalized plan that takes into account unique threats and vulnerabilities. This advice is particularly important in the context of industrial espionage, e.g. for academic employees.

 

25. Backup your data, including data that you cannot afford to lose.

Creating regular backups of data can include documents, photos, and other important files that are essential to your personal or professional life. Data loss can have many causes, such as hardware failure, malicious software such as ransomware, or even accidental deletion. There are many ways to create backups, from the simplest, such as copying to external disks, to automatic cloud backup. It is worth automating this process, but we cannot provide a universal method because everyone may have different needs and costs in case of failure. However, if you are in an exposed position, such as a political one, consider whether you should use a cloud belonging to a foreign company cooperating with that government.

 

26. Consider whether posting live vacation photos exposes your home to being an easy target for thieves.

Posting vacation photos during your stay may seem harmless, but it can potentially expose your home or apartment to the risk of being targeted by thieves. When you post live updates from your vacation spot, you are actually informing the world that your home is empty and therefore vulnerable to theft. Criminals can track your location and monitor your activity on social media to determine when you are away from home and how long you will be absent. They can also use your photos to learn the layout of rooms in your home or estimate the value of items located there.

To avoid exposing your home to risk, it is best to wait to share photos and updates until you return home. If you really can’t resist sharing live updates, consider adjusting your privacy settings so that only trusted friends and family members can see your content. On Instagram, this option is called “Close Friends.”

 

27. Do not post your location, especially if you are a controversial or popular person.

If you are a controversial or famous figure, sharing your location can make you more vulnerable to harassment, stalking, or even physical harm from people on the Internet. Revealing sensitive data by enemies of a creator or user on the Internet is called doxing. If your home address is leaked, you can expect not only jokes like random internet users ordering tons of potatoes or coal there, but also bringing in law enforcement. In the United States, there are known cases of so-called swatting, which involves sending authorities to the victim’s address, saying that something bad is happening there. Sometimes such irresponsible pranks even end up with fatalities, as in the case from Kansas. We encourage you to watch a 2-minute report on this topic: https://www.youtube.com/watch?v=OjEG94NsHNk

 

28. VPN probably will not protect you from legal liability if you are doing something illegal.

This means that even if you use a Virtual Private Network (VPN) to hide your online activity, it does not guarantee complete protection from legal consequences. Some VPNs claim not to log traffic, but this is not true. If you want to hide your identity, use TOR solution, preferably in combination with a so-called bridge.

 

29. Be skeptical of the phones and SMS messages you receive.

You should approach every phone call and SMS message you receive with caution and care. There are many scams and criminal activities carried out through phone calls and text messages, so it is important to be vigilant and verify any information you receive.

 

30. Google ads may contain fake pages of banks or your favorite websites. Be careful when searching for any services in the search engine.

When using the Google search engine to find specific services or products, be careful of the ads that appear first in the search results. Some of these ads may lead to fake websites that impersonate real companies, such as banks or your favorite websites. Fake pages may try to trick you and steal your personal information or money. This is particularly important when searching for your bank’s phone number or website. In the Polish online space, there are many scams advertised in this way concerning banks and the Baltic Pipe.

 

Is it an end of our saga about cybersecurity ? I don’t think so…

See more on our blog:

User Identity and Access Management – What’s the Deal with IDP?

User Identity and Access Management – What’s the Deal with IDP?

What user identity is? Why managing access is essential for businesses? How an IDP (Identity Provider) works? You will find the answer to these questions in the article.

Security

Design Patterns – part 2

Design Patterns – part 2

Hey, hey... Programmer, this is another article for you! The second part of the article on design patterns. Get to know Adapter and Memento.

Programming

Design Patterns – part 1

Design Patterns – part 1

Programmer, this article is for you! Grab a handful of useful information about design patterns.

Programming