Online Safety Tips For Online Users

I

Online Safety Tips For Online Users

 

Many of us are careless with the ways we interact online. Some of us are so careless that we can share anything we like on social media. Based on what you are sharing, the bad guys can know what interest you and craft messages that will be of interest to you. Here are some of the safety tips for online users. Let’s look at that in this article. 

 

Below are a few important online safety tips.

 

#1 What you share on social media

The more information you share on social media, the more you allow an attacker to know you. With more knowledge, an attacker can craft a much more targeted attack. For example, by sharing with the world,  you went to a car race, an attacker can craft a malicious email coming from the ticketing company responsible for the race event. Because you have just been to the event, the email seems more credible.

 

YOU CAN ALSO READ  Analysing Intrusion Detection System In Security

#2 Reusing Passwords

Reusing passwords is a bad practice. If you reuse a password in service under attackers’ control, they may be successful when attempting to log in like you in other services.

 

#3 Emails Culture

Emails can be easily forged to look legitimate. Forged emails often contain links to malicious sites or malware. As a general rule, do not click embedded links received via email.

 

#4 Unsolicited software

 Do not accept any unsolicited software, especially if it comes from a web page. It is doubtful that a web page will have a legitimate software update for you. It is strongly recommended to close the browser and use the operating system tools to check for the updates. Lab – Discover Your Own Risky Online Behavior  Cisco and/or its affiliates,

tips for online users

#5 Malicious web page

Malicious web pages can be easily made to look like a bank or a financial institution website. Before clicking the links or providing any information, double-check the URL to make sure it is the correct web page.

 

YOU CAN ALSO READ  Analysing Facebook Privacy Settings for Users

#6 Program Power

When you allow a program to run on your computer, you give it a lot of power. Choose wisely before allowing a program to run. Research to make sure the company or individual behind the program is a serious and legitimate author. Also, only download the program from the official website of the company or individual.

 

#7 USB Drive

USB drives and thumb drives include a tiny controller to allow computers to communicate with it. It is possible to infect that controller and instruct it to install malicious software on the host computer.

 

Because the malware is hosted in the USB controller itself and not in the data area, no amount of erasing or antivirus scanning will detect the malware.

 

#8 Wi-fi

Attackers will often deploy fake Wi-Fi hotspots to lure users. Because the attacker has access to all the information exchanged via the compromised hotspot, users connected to that hotspot are at risk. Never use unknown Wi-Fi hot spots without encrypting your traffic through a VPN. Never provide sensitive data such as credit card numbers while using an unknown network (wired or wireless).

 

YOU CAN ALSO READ  3 Major Approaches To Network Security

 

Now Tell Us Your Own Side Of This Story.

We would also like to hear what you feel about the topic we discussed today. Your feedback is very important to us. Feel free to drop your comments and recommendations. If you have a contrary opinion, you can drop that too.

 

You can also join our Facebook Page CRMNigeria for more updates. You can do that by clicking on the link or searching for our page on Facebook.

 

You Can Also Join Our WhatsApp Group Here.

 

Finding the right Long-tail Keywords? Start Your Journey Here.

Save Campaign spendings. Get Experts On Fiverr.

 

 

 15 total views,  1 views today

Adeniyi Salau

Adeniyi Salau Scrum Master Certified , CCNA R&S , BeingCert and Scrum Certified Digital Marketing Professional, CEP, MOS, MCP, CSCU (Project 2016), Microsoft Certified Security and Networking Associate is a Google and Beingcert Certified Digital Marketer, Project Manager and SEO Expert of repute with about a decade of Blogging and online marketing experience. He is always ready to share his experience with others.

Write a Comment

Your email address will not be published. Required fields are marked *

CommentLuv badge
%d bloggers like this: