0800-31-0700 for new subscribers
0800-31-0800 technical support

Internet safety: what you need to know

Home /

Blog

/

Internet safety: what you need to know

Internet safety: what you need to know

27.12.2024

Internet

34

We have already told you how to protect your child online in one of our previous articles. Now we are sharing tips on how to take care of your online safety by protecting your gadgets so that your personal data is not taken over by intruders.

Protection against malware

First of all, you can protect your devices from “pests” by downloading virus detection software (antivirus software). It is better not to install programs from unknown sources or hacked versions of paid programmes: antivirus software should be downloaded only from the official website of the developer or from verified sources (Play Market, App Gallery, App Store and Google Play). And to ensure that the programme warns of threats in time, the antivirus should be updated regularly. 

Also, in order to use the Internet safely, pay attention to the following recommendations:

  1. Systematically check for threats on your computer, as well as USB drives and other external devices that you connect to your PC.
  2. If you have doubts about the reliability of your smartphone, you can reset the device's settings — this allows you to disarm programmes that track user activity.
  3. Remember to check the download link of the file before clicking on it, and don't click on dodgy links. The latter include:
    • received from unknown senders by email, SMS or messengers or social networks;
    • notifications using a very topical subject or urging you to do something urgently;
    • links that lead to dubious sites or social media channels;
    • links without a security protocol (https — safe link, http — potentially dangerous);
    • links with the word “download”, which immediately start downloading a file that may be accompanied by malicious code.
  4. Pay attention to sudden and noticeable changes in the device operation, such as a sharp decrease in charge, slow operation, appearance of unknown programmes in the autoloader when the device is switched on, etc., as this may be the result of malicious programmes.

Setting strong passwords


First of all, let's define the term “strong passwords”. Strong passwords are those that:

  • don’t contain common combinations of letters and words, repeated symbols (0000, 1111, abc123), your name, surname, date of birth, as well as the name, surname, or date of birth of your parents, children, husband/wife;
  • contain special characters, numbers, capital and small letters over 8, as well as words that are not available in Ukrainian or English, and preferably in other languages;
  • created with the help of password generation service (e.g. cyberpolice.gov.ua/generate-password);
  • used only in one service;
  • are not saved in notes on your smartphone/laptop or on a sticker on your laptop;
  • are not available in the haveibeenpwned.com database;
  • not known to your family, loved ones, or colleagues;
  • are significantly different from the last password you used on the same service.

All other passwords are insecure, making your services easily hacked by hackers and scammers.

Therefore, we advise you to adhere to the following Internet security rules:

  1. Replace passwords on social networks, bank accounts, and all sites where personal information about you may be present with more secure ones. In particular, it is recommended that all passwords be changed periodically.
  2. Regularly check passwords for leaks. For example, you can do it with the help of this service. All you need to do is enter your e-mail address on the site. If it turns out that the passwords of accounts registered to it have been compromised, you will receive an instant notification about it.
  3. Use password managers — special applications (1Password, KeePassXC, Dashlane, etc.) that store your passwords in encrypted form like safes. In this case, you don't need to memorise all the complex combinations — you just need to remember the password from the application itself.
  4. Set up two-factor authentication — two-step verification when you log in to your account. As a result, in case of a hacking attempt, you will receive an SMS message asking you to confirm your account login.
  5. Set an on-screen password, graphic key, or biometric security to unlock your devices.
  6. Replace the default PIN code to your SIM card.

Download and use apps and files safely

When downloading a free film, game, or music, there is always a risk of malware infecting your device. To keep your data and devices safe, follow these rules for downloading files and downloading apps:

  1. Use only licensed software from trusted sources (Play Market, App Gallery, App Store, and Google Play or official developer websites). 
  2.  Don’t download files and applications from unknown sources (dubious websites, social media pages from unknown senders). Potentially dangerous file extensio00ns include .exe, .bin, .ini, .iso, .dll, .com, .sys, .bat, .js, .apk. Whereas .docx, .zip, .rar, .pdf are considered potentially safe extensions. 
  3. Check installed files with an antivirus programme.
  4. Don’t download cracked versions of paid programmes, as they usually contain malicious software code. If you can't buy a paid version of a program, it's better to find its free analogue.
  5. Don’t install applications from unverified sources or automatically download files, and select the ‘ask for file storage location every time before downloading’ function for your browser so that the download process does not start automatically without your confirmation.
  6. Check the information about the developer of the application before downloading it from the Internet and whether the online service is not banned in Ukraine.
  7. Control the permissions that the programme asks for during installation. Keep in mind that not all apps need access to your geolocation or personal information to work properly.
  8. Regularly update applications on your smartphone and software on your computer.

Data protection in social networks


  1. In order to keep your personal social network accounts safe, we advise you to follow these rules for safe Internet use:
  2. When creating social media accounts, use as login an email address of a reliable service (e.g. Google, Yahoo).
  3. Set a strong password to access the account.
  4. Use the double authorisation feature to prevent account hacking. If this feature is activated, the service will require additional identification in case someone tries to log into your profile from an unfamiliar device.
  5. Don’t authorise from unfamiliar or unsecured devices either. In such cases, either you may forget to log out of your account, or the device may remember the username and password you specified when logging in. In addition, the device may be infected with malware, which could leak your passwords and logins to interested parties.
  6. Don’t open tabs in messages received from suspicious or unfamiliar contacts. This way you will protect yourself from phishing
  7. In the profile settings, choose the ones that best protect additional information about the account owner (in particular, do not specify your location).
  8. Limit public access to private information (your location, date of birth, etc.) in the social network privacy settings.
  9. Periodically review your “friends” list. If you see unfamiliar or suspicious accounts among them, delete them, as the status of “friend” gives you access to more private information about you.

Safe data storage

In terms of file security, the following tips are useful:  

  1. Save important personal files encrypted or in hidden folders and albums:
  • On Samsung devices, use the secret Knox folder to which you can move some apps, photos, and other content.
  • On Android devices to store your data securely:
    1. go to the “Gallery” — “Albums” folder, tap and hold the desired album, then select “Hide” in the additional menu; 
    2. or go to the “Gallery” — ‘“Albums” folder, swipe the screen from top to bottom and a hidden folder will open, where you need to set a password or graphic key;
    3. or use the “Second Storage” feature available on some Android devices.
  • On an iPhone, iPad, or iPod touch, go to the Photos folder, select the photo or video you want to hide, then click “More” — “Hide” — confirm your actions.
  1. Use encryption for communication and correspondence to ensure your data is protected from hackers. For email, this can be asymmetric PGP encryption, for which there are special programmes, and for messengers — encrypted chats and messages that disappear after a while. 
  1. Save copies of important files in cloud storage (Dropbox, OneDrive, Google Drive, etc.) to be able to recover data in case your smartphone or laptop is hacked. 

By following these Internet security tips, you can protect your gadgets from personal information leaks and fraudsters.

Comments

0

Еще комментарии