Safety Tips on the Internet

Introduction

When you leave home, probably take care to protect yourself from burglaries and other dangers on the streets. On the internet, it is also important to put into practice some of the procedures security, for fraud, espionage and theft of files or passwords are just some of the problems that people may face in this environment.

Is to help you deal with the online dangers that the DigoPaul features following some safety tips. All are simple, therefore, you do not you will have difficulties to put them into practice in your day-to-day.

1. Exit by clicking “Logout”, “Exit” or equivalent

To access your email, your account in a store, on-lne, your profile on Facebook, your online banking or any other service that requires user name and password, click on the button/link name Logout, Off, Quit, Disconnect or equivalent to leaving the site. It may seem obvious, but a lot of people done this procedure by simply closing the browser window or entering another address from there.

o act thus is not recommended because the site has not received the instruction to terminate your access at that time, so that another person you can reopen the page in question right then and access the your information. This tip is valid mainly in public computers — the faculty, for example.

2. Create passwords that are difficult to decipher

Do not use passwords that are easy to be discovered, as the name relatives, birthday, card, car, etc. Give preference to sequences that mix letters, numbers, and even special symbols. In addition, it is not use it as a password-a combination that has less than six characters. It is also important to not store their passwords in Word files or of any other application. If you need to write down a password on paper (in extreme cases), destroy it as soon as you memorize the sequence. In addition also, avoid using the same password on multiple services.

In addition to creating passwords that are difficult to decipher, is essential to change them periodically, every three months, by less. This is because if someone manages to find the password of your e-mail, for example, you may access your messages without you you know, just to spy on you. To change your password, the such spy will no longer be able to access your information.

3. Use current browsers, and renowned

Using internet browsers current ensures not only that you are able to use new technologies for the Internet, such as HTML5, but also tell with security features able to combat dangers more recent, such as fake web sites that happen for pages of the bank. In addition, updated web browsers generally come with fixes against security flaws exploited in the earlier versions. Therefore, always use the latest available version of your browser.

Fortunately, all major browsers today come with automatic updates or alerts the availability of a new version. But, if you do not have sure you are using the version the most recent, you can browse in the menus of the browser a name option “On” (or equivalent) that typically provides this type of information.

4. Update your antivirus and your operating system

You certainly know that it is important to install software security on your computer, such as an antivirus. But, in addition to install it, it is necessary to make sure that the program is up to date constantly, otherwise, the antivirus will not “will know” of the existence of malware new. Virtually all of the current virus have updates automatic set by default, but it is always good to check.

Also it is very important to install the updates to your operating system, including their mobile devices (tablets and smartphones). For that you don’t have to worry about it constantly, check if your operating system has the functionality of automatic update turned on (most have this feature, like the more recent versions of Windows or Ubuntu Linux).

5. Very careful with downloads

If you use sharing programs or frequently get files sites that specialize in downloads, be aware of that download. At the end download, check if the file has some characteristic strange, for example, more than one extension (as cazuza.mp3.exe), very small size for the type of file or information description suspicious, because many of the plagues digital pass by music, videos, photos, apps, and other to fool the user. In addition, always examine the downloaded file with an antivirus.

Also be careful with sites that ask for you to install programs to continue browsing or to take advantage of some service. Still, be wary of offers of software, “miraculous”, capable to double the speed of your computer or to improve its performance, for example.

To get software that, in principle, are legitimate, you should also take care of your installation: during this process, the application can leave of way pre-selected activation joint other programs, such as toolbars for browsers or alleged applications security. So, follow all the steps installation and reject any offer of the type.

6. Avoid the use of pirated software

Games, office applications, operating systems and image editors are among the software most pirated. Your the use of which may seem advantageous because of low cost, but other problems, programs that condition presents a danger because they can be distributed with malware and, many times, does not come with the security updates that the developer provides to the original copies.

7. Be careful with links in instant messages and social networks

Some malware may even temporarily, advantage that the user is using instant messaging services such as WhatsApp, Telegram and Skype to issue automatic messages with links to viruses or malicious websites during a conversation. In such situations, it is common that the part that received the message think that the other person really sent it and, thus, just by clicking on the link with the greatest good will.

Therefore, if you receive a link that was not expecting during a conversation, ask the contact if, indeed, he sent it to you. If the person deny, do not click on the link and warn you that your computer or smartphone may be a malware.

Note also in the social networks such as Facebook and Twitter, because a contact can, for example, recommend a link without noticing that your content is dangerous or an application’s doubtful you can make a the post without that the person has perceived.

8. Fake emails are still very common

Received an e-mail saying that you have a debt with a telephone company or stating that one of their documents is illegal? Or, still, the message provides you with awards or photos that prove a betrayal? There is a summons to a judicial hearing? The e-mail asks you to update your banking details? It is very likely (very likely even) that if it is a scam, or is, a fake email, so ignore it.

If the message contains texts with spelling and grammatical errors, you make offers tempting or report a link that is different from the one indicated (to check the link true, just pass the mouse cursor over it, but without click, be suspicious immediately. When in doubt, contact the company or entity whose name has been involved in the e-mail.

  1. Avoid accessing dubious websites

Many websites contain on their pages and scripts able to explore failures of the Internet browser. Others do not have scripts, but try to convince the user to click on a link dangerous, to do registration in a service suspect, and so on. It is relatively easy to identify these sites:

  • Its theme is very appealing, exploring erotic content, hacking, or gaming, for example;
  • The site automatically opens multiple pages or windows with banners;
  • Your address (URL), not rarely, is complex or different from the name of the site;
  • The site displays ads that offer prizes, benefits or free products;
  • Require the download of a program or registration to finalize determines action.

When faced with sites with these or other suspicious features, do not continue the navigation.

  1. Attention to email attachments

This is one of the instructions, the oldest even so, the e-mail is still one of the main forms of dissemination malware. Be careful when you receive messages that ask you for to open the attached file (claiming it is a photo compromising, for example), even if the e-mail has come from someone you know. To increase security, you can check the file with an antivirus, even when you are waiting to receive it.

  1. Careful when shopping on the Internet or use the websites of banks

Shopping on the Internet is synonymous with convenience, but only the make on e-commerce sites with a good reputation. If you are interested in a product that is sold on an unknown web site, do a search to find out if there’s complaints against the company. A good service for this is the site ClaimHere. See more tips about shopping online here.

To access your bank account over the Internet, also be careful. Avoid doing it in public computers or public Wi-Fi networks, always check if the address of the site belongs to the same to the banking service and follow all safety standards recommended by the bank. There is more guidance on these tips for use of Internet banking.

  1. Don’t respond to threats, provocations or intimidation

If you receive threats, provocations, intimidation or something like that over the Internet, avoid responding. In addition to avoid more hassles, this practice prevents the author get important information that you may end up revealing because of the heat of the moment. If you realize that the the threat is serious, or if you feel offended, keep a copy of everything and ask for guidance of the legal authorities.

  1. Do not reveal important information about you

In social networks (Facebook, Twitter, Instagram, among others) or on any service where a stranger can access your information, avoid give details of the school or college that you study, the place in which you are working and particularly where you live. Also, do not provide data or photos that you provide details relevant to you, for example, images in the that appear in the facade of your home or the board of your car.

Never disclose your phone number openly by such means, nor tell the location in which you will be in the next few hours, or a place you frequent on a regular basis. If these data are directed to their friends, let them know in a special way, because all and any relevant information about you may be used abused by malicious persons, including for you find.

14. Care to make registrations online

Many sites require you to make a registration to use their services, but this can be a “trap”. Now, if  a site asks for the number of your credit card without that you have intention of buying any, the chances of this being a “stolen” are great. In addition addition, your information can be delivered to companies that sell magazine subscriptions or products by phone, by example. Still, your e-mail address can be entered into SPAM lists.

So, before registering in web sites, do a search on the Internet to check if that address has record of any illegal activity. Also, consider if you have the same need to use the services offered there.

15. Use two-step verification

Several companies, such as Google, Apple and Microsoft, offer in their services the option of checking in two steps (two-factor authentication). With it, you should enter a code after signing up, the otherwise, you will not have access to the service, even to type the password correctly.

In most companies, the code is sent by SMS. So, only you have access to it. But the code can also be issued by devices of the type “token” (such as those used by banks), or by applications (like Google Authenticator).

The advantage of the two-step authentication is that, if your password is discovered by a third party, this person is not you’ll be able to access your account because it does not have the verification code. Check if the services that you use offer this feature.

16. Public Wi-Fi networks can be dangerous

Please be very careful when accessing public Wi-Fi networks, especially those that do not require a password. Some can be “baits” to capture data from the devices connected to it. Other can direct to fake sites. So, give preferably the networks of well-known companies.

Ending

To protect yourself in the “virtual world” can even be a little laborious, but it is important to have a defensive posture to avoid or, at least, minimize disorders. The majority of the “snares” online can be avoided if you remain aware of and willing to practice the proper care in your daily life.

It is also important to be aware of whom you are next to you, so not only does it practice the care of safety on the Internet, as well east relatives and friends.

Safety Tips on the Internet 1

Safety Tips on the Internet
Rate this post

You may also like...