May 17: World Internet Day 6 ways to stay safe

Although the Internet is in our life 50 years on, we still repeat basic mistakes like using weak passwords, avoiding updates, or browsing insecure pages that leave the exposed us to cyber threats.

Today we cannot live without the internet, one of the most basic resources among the new generations. Do you remember looking up information in an encyclopedia or going to a travel agency to buy a plane ticket or book a hotel? It seems like ages ago, but the truth is that the network of networks has changed the way we do many tasks and opened the doors to new possibilities that allow us, for example, to work from anywhere or make a bank transfer from our phone with just one click.

live threat map

Unfortunately, this relentless evolution is also present in the multiple threats posed by cybercriminals. We've come a long way since viruses were distributed on floppy disks and Morris and when the first worm hit the Internet in 1988, to today and the emergence of , spyware and ransomware, the main protagonists of cybercrime today. According to Security Report 2023 of Check Point Software Technologies Ltd. provider of cyber security experts, cyber attacks increased by 38% in 2022 compared to the previous year, with an average of 1.168 attacks per week per organization. A situation that looks set to continue to worsen in the coming years. In GREECE, the number of weekly cyber attacks touches them 774, with an annual change of -5%, which although looks positive, organizations must remain vigilant and take all necessary measures to protect their information.

All of this makes it clear that we need to be prepared to face these threats, and that's why Check Point Software is using World Internet Day as an opportunity to remind us of the "bad habits" we continue to maintain that affect digital our security:

  • Forget passwords: this is one of the most common mistakes and yet one of the most impactful practices in maintaining proper cyber security. We all find it easier to recycle passwords and use the same one for business and personal emails, but we are putting important data at risk. It's also very common to share them – Netflix or Spotify passwords, for example – and we often write them down or send them in a text or email to family or close friends. This reality translates into millions who every year see their accounts hacked because they don't take care of their passwords. To avoid this, it is recommended that you create secure passwords, with at least 12 characters and a combination of upper and lower case letters, numbers and special characters. Likewise, it's always recommended to update them every few months and not reuse them across multiple different platforms or accounts
  • Update, update, update: all systems and devices have regular updates designed not only to improve or fix usability, but also to apply patches for potential vulnerabilities. The message to update often appears at inconvenient times or when we don't have a Wi-Fi connection and we usually end up postponing or even ignoring its installation, unknowingly leaving an open door for cyber attacks. By simply keeping our devices up to date, we can avoid many of the vulnerabilities that can occur
  • Falling victim to her ς: while most cyberattacks today focus on data theft, recently there has been an increase in hacktivism practices and other state-related threats. This type of practice often involves the distribution of disinformation with fake news or biased and incomplete messages that prey on the emotional side of users to create discord. For this reason, it is recommended that we use various sources when informing ourselves, as well as check any news or chain messages before falling into practices such as mass dissemination. One of the main pillars of internet security is common sense.
  • Use of free wireless networks: to avoid using your own data, it is increasingly common to surf between hot spots and free Wi-Fi networks in restaurants, airports, train or metro stations, hotels, and even public or private transport. However, security researchers have proven in many cases that these types of wireless networks have little or no security. It is recommended not to access an unknown network, but if this is required, limit your use to basic browsing, avoid entering passwords or using sensitive applications such as payment platforms or banking access.
  • Acceptance of privacy policies and licenses without review: who ever reads data usage terms and conditions? These long and confusing texts encourage most people to accept all terms of use for any app without further delay. While this allows us to start enjoying them faster, it can lead to a serious security problem and even a breach of all our data. On the one hand, cybercriminals often use some popular apps or programs to spread their malicious code, while some malicious developers hide certain clauses to transfer permissions to collect, store and even trade with this data. By taking a few minutes to check the rights and conditions before installing a program, we can avoid falling victim to fraud or having our personal information exposed.
  • Browsing and trusting insecure websites: one way to spot this type of fraudulent website is to look for minor errors such as typos, poorly written text, or the presence of misleading or poor quality images. However, the most effective method is undoubtedly URL parsing, with security indicators such as SSL certificates (indicated by the presence of a padlock next to the web address). or alerts, such as the presence of irregular characters or subdomains.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.093 registrants.
World Internet Day

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).