7 Cybersecurity Tips - Protect Yourself Online

in hive-196037 •  3 years ago 


Most people do not take very good care of their online security. Here are 7 things you can do to protect yourself better online. Take it from someone who studied IT Security, cybersecurity matters.

This is my 519th episode/article. I put a great deal of work into this content so if you find it valuable, please do like, share, comment and subscribe!

For passwords and emails, you want to have the fewest connections possible between them, no re-used passwords, and only one recovery email completely separate from everything. The worst thing you can do is have one email that connects to everything and gives a bad actor access to everything.

• Passwords
o It’s easiest to use a password manager to manage all your passwords which shouldn’t be re-used if possible.
 I like to use LastPass - https://www.lastpass.com/
o Have different passwords at the very least for your more important accounts. If you don’t want to have 100 passwords, you can use one for your bank, one for crypto, one for bank email, one for your crypto email, one for social media, and one for your recovery email.
o Since there are hacks, leaks, etc. You should try to change your passwords once a year.
o Use http://www.passwordmeter.com/ to create a good password and https://www.security.org/how-secure-is-my-password/ to see how long it would take to crack it
o The best type of password that you can remember is 3 words with at least one capital, 3 numbers, and 1 special character.
 Example – 471!girlrainbowbridgE – This would take 3 sextillion years to crack.
• Emails
o Use a public facing email for things that are unimportant.
o Use multiple emails with no identifiable words that connect to you in some way for important accounts. For example, if your name is Scott Cunningham, don’t use an email like [email protected] for your bank account.
o A good example of an email could be similar to the password style like [email protected]
o Use an email provider that won’t penalize you like Google might. I recommend Protonmail.com
o Don’t use your bank, crypto, or recovery email for anything in public. Use your unimportant email to sign up for things.
o You can check if your email was in a database leak or if any passwords you have connected to them were leaked: https://www.avast.com/hackcheck/#pc and https://haveibeenpwned.com/.
• Use security and privacy services
o Use something like a VPN for privacy and security as well as a secure browser. I like to use Brave browser because it also blocks ads and things could potentially contain something malicious and save data.
o Limit as many permissions where possible like on social media accounts and use as many privacy options as possible. Brave browser also has privacy options you can enable.
o Use an anti-virus software. I like Avast, but I also McAfee since it comes with Bell’s internet service.
o Also always keep your firewall on and your system up to date with the latest updates and patches for security flaws.
• Understand social engineering
o The most important thing you need to keep in mind is that 90%+ of “hacks” are just social engineering. You are most likely to run into trouble online because you were simply tricked. Whether it’s by a phishing website, fake email, or anything similar.
• Privacy & sharing personal information
o You should share as little personally identifiable information as possible. If you are not public facing with your professional career, you’re better off hiding as much private information as possible from the public. This is most important for crypto-related accounts.
• New accounts
o Always create brand new accounts instead of using social account logins like Google or Facebook.
o Use platforms that don’t require much information from you. (No KYC)
• Internet usage
o Always connect via an Ethernet cable and avoid using Wi-Fi where possible.
 You can be much more easily tracked and hacked via Wi-Fi

Do you follow any of these practices? Am I missing any or wrong about any? Let me know what you think about this in the comments below and don’t forget to subscribe!
👉 https://www.youtube.com/channel/UCDBycVghUbnimnzqirsU1Jg?sub_confirmation=1 👈

Disclaimer: This is not financial advice and is purely for entertainment purposes. What you see, hear, or read is my personal opinion, and any statements made are based on my views and should not be misconstrued as fact. My crypto portfolio may or may not be simulated

👥 Support Me & Follow Me Elsewhere 👥
👉 http://www.scottcbusiness.com
Ask questions in my Telegram: https://t.me/cryptoandthings
You can find all of my referral links here: https://linktr.ee/scottcbusiness

~ Sponsors


▶️ DTube
Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE BLURT!
Sort Order:  
  ·  3 years ago  ·  

How about using Linux ( TAILS linux comes to mind ), VPNs, Tor, and encrypted drives on Linux? This may also lower your attack surface from hackers.
#1HAM

Yeah for sure, I wasn't going to get into deep as I know most people aren't using Linux

  ·  3 years ago  ·  

This post has been manually upvoted by @epistem


You are invited to use the tag #epistem when posting within the niche of the community. Also, follow us on @epistem and on our Discord community

The EPISTEM Project