The internet is very much a part of our lives now. There is hardly a day we don’t use online services. Whether it’s sending an email or checking our balance through a mobile app or even hailing a ride, the internet serves more purposes in our lives than we care to admit. Despite this convenience, the cyberspace is fraught with dangers. There are hackers stealing personal data to blackmail you, others just ready to mess with your computer for the fun of it and, there are still others who will easily sell your data on the dark web. Follow these steps to make sure your data and personal information are safe online.
Passwords are meant to protect our data from illegal access. While usernames and email addresses can be guessed, a well-thought password is difficult to predict and crack. The best advice is to create a complex string of characters that you alone can remember. Use a combination of lower and upper cases, numbers, letters, and special characters to make it difficult for hackers to figure out. Stay away from using your birthday or that of a loved one. Also, change your passwords regularly.
In addition, it is best to not store your password in any browser. Unless you are using a password manager, the dangers the cyberspace poses is more than the convenience of not having to type in your passwords.
Especially on social media and with email, you should always use the double factor authentication method if they are available. Double-factor authentication provides a two-tier login process to keep your accounts safe in the cyberspace. After entering your password, the service provider will then send a code to a mobile number you have on record to complete the authentication. This means if someone manages to get access to your password, you will still be notified because the code will come to your mobile phone.
Different platforms serve a variation of security protocols to keep your data safe in the cyberspace. Whether it is facial-recognition for your mobile devices or thumb-print lock mechanism, there is no such thing as too much security. Make use of all the security features available to you; cyber criminals can be relentless in their efforts to compromise your security. The more layers of security you have, the more difficult it is to get compromised.
Mobile has been the new cool these past few years. Most service providers have followed suit by providing mobile versions of their applications, making it easy to reach clients. While mobile apps might seem convenient, it is important to understand the implications of downloading apps from the Playstore or the App Store.
Apps need access to certain features on your smart device to function optimally. It might just be permission to access your photos in the case of social media applications. Sometimes, though, they need real sensitive information as well as access to your friends lists, your camera settings and other such stuff. Make sure you are comfortable with these before clicking to download. Though there is no full-proof platform, the Playstore and the App Store have security features that serve as a first line of defense against apps that exploit vulnerable users.
Also, check past reviews to make sure you are not being deceived. But don’t limit yourself to that. Do a google-check about the app. A simple [app name] malware search could reveal more than you would know. Also, read the privacy policy. It’s boring and may seem redundant, but a well-written privacy policy will show you how the app developers treat your data and what you should do if you are not impressed. If their privacy policy bothers you, do not download the app.
“Log in with Facebook?” You’ve probably seen this many times as you create accounts online. Using credentials from a popular application lets you avoid memorizing yet another password. It’s convenient, but there’s a catch: even though you don’t offer any information to the website, they might still get them from Facebook or whichever third party app you used to log in. That’s right, the cyberspace is so connected your information is only a permission away.
Most often than not, you will have the chance to select which information you wish to share with these applications. When the chance arises, offer only what you are comfortable sharing. Also, there will be an indication as to which information is needed before you can enjoy the service. If a piece of information isn’t required, you do not have to give it. It is important to check these since many of the permissions come already selected for consent. Select what you are willing to offer and deselect what makes you uncomfortable.
There is a great temptation to share anything and everything you come across online. It might feel like you need to do so to stay abreast with trends. However, that practise also provides easy access to information about you to the public, and makes it easier for criminals to target you with greater precision. You can still enjoy the cyberspace without sharing everything about your life on social media platforms. Your email service provider needn’t know about your special anniversaries. If you are sharing personal information in the cyberspace, make sure the website has security measures in place. If the browser says this site is not secure, do not enter your personal details, let alone your credit card information.
Stay safe!
Share this article with your friends
No. 35/C16
Off Spintex Road
Opposite Global Access
Accra, Ghana
+233-(0)30 297 8297
+233-(0)55 846 8325
Copyright 2017 © Gesatech Solutions