Skip to main content

Internet usage best practices.



The following guide leads you to the best practices when you're using internet.

  1. Protect your data
    • Don’t use public storage for private information: Don’t use online services that are meant for sharing information to store your private data. For example, Google Docs isn’t an ideal place to store a list of passwords, and Dropbox is not the best venue for your passport scans unless they are kept in an encrypted archive.
    • Keep your main e-mail address and phone number private:  Don’t share your e-mail, home address and phone number with random people on social networks and mistrusted websites. And consider creating a separate, disposable e-mail address and, if possible, a separate phone number for these cases.

  2. Use secure passwords.
    Don't use common password such as '12345', 'qwerty', 'password', etc. The ideal password is a random collection of letters, numbers, and some symbols. But this kind of password maybe unable to remember. To simplify things, a good rule of thumb is to include at least 1 number, 1 uppercase letter, and 1 symbol in whatever word(s) you choose to use. Here is a complete guide to how to choose a strong password: https://us.norton.com/internetsecurity-how-to-how-to-choose-a-secure-password.html

  3. Don't reuse passwords.
    You never know exactly when a password is compromised. Most applications or software will make you change for your password every 6 months to a year for that reason. Don't use the same password across different accounts, either. If a hacker gets the password to one account, they have it for all accounts.This is one of the best security practices.

  4. Be suspicious of external downloads and emails.
    Phishing emails are designed to seem like they are being sent from a real person or company in order to obtain information from you. A spyware download may also look like a genuine file.
    • Don't respond to email, instant messages (IM), texts, phone calls, etc., asking you for your password. You should never disclose your password to anyone.
    • Only click on links from trusted sources. Never click on an unfamiliar link unless you have a way to independently verify that it is safe. This includes tiny URLs and any link where you can't tell where it will take you.
    • Don't open unsolicited or unexpected attachments. If you can't verify an attachment is legitimate, delete it.
    • Don't give private information to anyone you don't know or who doesn't have a legitimate need for it -- in person, over the phone, via e-mail, IM, text, Facebook, Twitter, etc.

  5. Keep software, programs, and applications up to date.
    One, never disable your anti-virus / firewall. Two, always keep software and OS up to date. Three, delete or deactivate any software, programs, or applications that you're not using.

  6. Be Careful when using public Wi-Fi.
    When using an insecure internet source (like public Wi-Fi), use a private IP service to provide a secure connection such as a VPN. Here is a guide to Do's and Don'ts of using public Wi-Fi: https://us.norton.com/internetsecurity-wifi-the-dos-and-donts-of-using-public-wi-fi.html

  7. Be Careful What You Download
    A top goal of cybercriminals is to trick you into downloading malware - programs or apps that carry malware or try to steal information - or a virus or ransomware  - to destroy your information. . This things can be disguised as an app: anything from a popular game to something that checks traffic or the weather. Don't download apps that look suspicious or come from a site you don't trust. Also always try to download genuine software from official websites.

  8. Make Online Purchases From Secure Sites
    Any time you make a purchase online, you need to provide credit card or bank account information - just what cybercriminals are most eager to get their hands on. Only supply this information to sites that provide secure, encrypted connections. You can identify secure sites by looking for an address that starts with https: (the S stands for secure) rather than simply http: They may also be marked by a padlock icon 🔒 next to the address bar.

  9. Be Careful What You Post
    The Internet does not have a delete key. Any comment or image you post online may stay online forever because removing the original (say, from Twitter) does not remove any copies that other people made. There is no way for you to "take back" a remark you wish you hadn't made, or get rid of that embarrassing selfie you took at a party. Don't put anything online that you wouldn't want your mom or a prospective employer to see.

  10. Be Careful Who You Meet Online
    People you meet online are not always who they claim to be. Indeed, they may not even be real. Fake social media profiles are a popular way for hackers to cozy up to unwary Web users and pick their cyber pockets. Be as cautious and sensible in your online social life as you are in your in-person social life.

Comments

Popular posts from this blog

                                                                          Seeder Hi, I Came across a very useful site  https://www.seedr.cc/?r=1618653  which is very helpful in downloading torrent files. It is free and will always remain the same.you just have to visit the site and just create an account.It can be done with your Google account also. You will get 2.5GB of storage for free account and it can be increased by some simple tasks given on the website. You can also buy premium membership which come in many varieties. You can either copy the torrent link or you can upload the torrent file on your account. Then it will provide you a direct link for downloading the file. It is a gift for those students who cannot download a bit torrent client due to admin rights but want to down...