Securing online presence, read more for detail information

Image: YouTube

The issue of data protection hyped up after Facebook user’s personal data was shared for the use of election manipulation by Cambridge Analytica. The issue was not a small deal it affected many users. Our private data hand over to an entity with assurance and expectation of confidentiality being exploited by a third party for nefarious purpose should obviously elicit a strong response. Before raising a voice in such kinds of issue we should remember the negligence that we perform while being online. Our carelessness has contributed a lot to such kind of matter. For some unaware people, social media has been a platform to disclose variants of confidential information. There are many people who disclose their personal information in social media and in reality they don’t will to share such kind of information with strangers. These kinds of things can take place when there is a lack of awareness. The major reason behind these kinds of incidents is the lack of proper education regarding the negative sides of internet stuff. People feel that the online world is an extension of the real world and think our real life is detached from our digital life.

It’s our neglecting habits that are creating a disastrous issue on the internet and social sites, we even do not read the terms of services in websites and software which are essentially binding legal contracts.

Each day attackers are attacking in different parts of the internet, people seriously need to be aware about cyber attacks. They should learn to safeguard their email and social media accounts. The experts have predicted, with the pace of time different kind of attacks on internet stuff can emergence. The challenges and threats are unpredictable; they can even ruin our life.

ThreatNix a service provider regarding cyber security have made a list of steps that you should follow in order to keep your data and yourself safe. Follow these steps to stay secure:

  • We do not recommend you share your private information anywhere on the Internet unless it is absolutely necessary and you completely trust the website. Such website should be secured with HTTPS protocol.
  • Be attentive of EULA and, terms and conditions for softwares you use and websites you signup to. While reading these long legal documents can be rather demanding, services like orgcan be useful.
  • Make sure that private information that you have provided on social media is not sensitive and publicly visible.
  • Be very suspicious of apps asking for authorization to your private information
  • Do not allow any apps to access your online profiles unless necessary and the app is from trusted vendor
  • Be critical of information you provide even to trusted and well known websites
  • If using VPN services make sure your IP, DNS or other traceable information is not leaking via the use of services like https://ipleak.net
  • Only use genuine software
  • Regularly update your systems
  • Be very skeptical of random pop-up windows, error messages and attachments
  • Make sure you use different passwords for each of your accounts.
  • Use strong passwords that can’t easily be guessed. Use password managers such as lastpass and 1password to make it easy to use strong password and store them securely
  • Always log off if you leave your device
  • Use two factor authentication where possible
  • Think twice before clicking on any link you receive in emails or private messages.
  • Never trust an email that’s too good to be true
  • Keep your antivirus and spyware detection software up to date.
  • Use Ad blocker in browser
  • Install nominer addon to block cryptojacking
  • Enable Popup blocker in browser
  • Never download and install unwanted and suspicious media-player/antivirus/games from untrusted sources
  • Don’t pick up and plug in pendrives that you just find lying around.
  • Never torrent or download cracked games/windows/softwares from untrusted sources, as most of them have been modified to perform malicious actions.

The above-given steps are taken from ThreayNix, Click here to view original post.

LEAVE A REPLY

Please enter your comment!
Please enter your name here