10 Ways To Protect Yourself Against Cybercrime

10 Ways To Protect Yourself Against Cybercrime

Cybersecurity threats are increasingly becoming a concern. Since the pandemic hits, the volume of cyber-attacks has increased five-fold. By 2021, these threats are estimated to cost $6 trillion.

Navigating in the “new normal” compels people to discover new ways of doing things. This is where the roles of technology and the Internet per se become valuable. Online, it’s not always sunshine and rainbows.

As the pandemic hastens digital transformation, new vulnerabilities emerge. For instance, as we jump from app to app, we reuse passwords without knowing how reckless this practice can be. Indeed, these heightened the likelihood of cyber-attacks.

Break the cycle of cybercrime victimization. Avoid becoming a victim with the help of these tips.

How to protect yourself against cybercrime

Your goal is to strengthen the security system of your device or infrastructure. It is part of being proactive about it since prevention is better than dealing with the consequences later.

  • Install an antivirus system.

An antivirus system builds a wall against intruders. So don’t skip this critical installation as they are designed to determine known viruses and other malware, and ransomware.

While at it, make sure that you are using the latest or updated version of the software. This can notify you of malicious activities that you can scrutinize. The antivirus software runs automatically in the background, providing real-time protection against known threats.

  • Install a firewall.

For an additional security layer, make sure that your system is protected with a firewall. It protects against unwanted traffic in your system.

What’s best, the firewall offers real-time protection by sending alerts or notifications about threats like ransomware and viruses trying to penetrate your system. Or worse, if the system has already been inflicted with a virus.

While at it, there are brands that offer full-service Internet security products and services. Some are free or freemium, while others are paid features.

  • Don’t use the same passwords.

This cannot be emphasized enough—using the same passwords on multiple websites increases vulnerabilities. This is an easy-to-follow trail that you create yourself, making it easier for the perpetrators to obtain your personal information that they can sell to third-party entities.

Complicate passwords with a combination of letters, numbers, and symbols. There are password generators online that can help in creating strong passwords. Also, never use your name or birthdate as your password.

Aside from using strong passwords, experts also recommend changing them regularly. Don’t forget to manage them prudently, keeping the passwords locked down all the time. Only you should have access to them.

  • Be diligent about webcams.

Perhaps you’ve given permissions to specific websites and apps without really knowing what they can do to your system and, thus, information. The reality is that opting out of fraudulent sites and apps can be difficult.

What you can do is to check which of the installed programs can access your camera. Pay attention to the LED indicators, which should be unlit or red when not in use.

  • Update the software.

Software applications are updated to keep cyber attackers at bay. That is when the weakness or vulnerability of the previous is unearthed.

Cybercriminals would not be able to exploit the system’s flaws if you update the operating system regularly. After all, technology companies themselves are sending notifications whenever a system update is necessary.

They do this to patch any exploit that could make your system an easy target among the attackers, ensuring cybersecurity in the process.

This brings us to another concern which is to use legitimate software programs. Counterfeit apps and programs may lead to a host of security issues in the future.

  • Manage social media settings.

In locking down personally identifiable information, you should never skip social media profiles. Social platforms are rife with data entry points that cybercriminals can take advantage of.

Check these points by going to the dashboard and determining how you share information with your network. For instance, a pet’s name and mother’s maiden name are common security questions.

If you keep on posting about your pets or putting your complete name on your profiles, chances are, fraudulent social engineers are already prying on you.

As always, share less publicly.

  • Never accept offline tech assistance.

Of course, unless you asked for it from a credible source such as the manufacturer of your hardware you’re having trouble with it.

Credibility can be challenging to discern. It is best to communicate with brands or companies through their official websites or social media pages.

Never talk to a stranger regarding your tech support. Who knows what cybercrime they can do and end up spying on you remotely.

  • Keep abreast of security breaches.

Arm yourself with the right knowledge, especially what you must do if you suspect a breach has occurred.

The same applies if you learned that a website where you have an account had been hacked. Learn how that security breach impacts users like you. Determine what information is exposed. Change your password or, if necessary, delete your account.

If the website is not aware and you are, communicate with them to let them know of the situation. Through this, they may address the breach at the server or cloud level.

  • Know what to do.

To continue with the above, suppose you’ve been victimized, alert the police and other authorities having jurisdiction like banks. Do this regardless of how minor the breach may seem. Authorities welcome any information because this aids in their investigation, helping thwart cybercriminals in the process.

If you suspect stolen information, contact your bank and credit card provider. Log fraud alerts and report the theft.

  • Learn best practices.

When using shared computers like in the library, cafe, hotel, or airport, it would be wise to use a VPN or a virtual private network. Through this, cybercriminals won’t be able to track your online activities. They would only see encrypted data.

Do not open websites without SSL, which stands for Secure Sockets Layer. This is a technical term, but you’ve encountered it for sure. Security is a Google ranking factor, a fundamental part of search engine optimization (SEO) in the Philippines, and elsewhere in the world.

If you search for something on Google and find websites with an ‘s’ on its website address (HTTP only, not HTTPS), it means the site is not secured. Skip it and move on to the next available option.

Comments are closed.