13 Essential Rules for Staying Safe on the Internet


February 9 is Safer Internet Day. For the last 13 years, cyber advocates across the world have used the second Tuesday in February to remind people to be careful out there. The day is now observed in more than 120 countries. And while most of the discussion is focused on keeping kids out of harms way, adults can also learn a thing or two.

Internet safety is also about securing yourself from cybercriminals, snoops, creeps, and assorted other denizens of the Net’s dark side. Follow these 13 rules, and you should be able to surf in safety.

If there’s a vulnerability in your operating system, browser, or other software, be assured the bad guys know about it. But no matter how quickly software makers plug that hole and push out an update, it won’t do a damn bit of good if you don’t actually install it. So install updates as soon as they’re available, especially those marked “critical. Better yet, set your OS and apps to automatically update if possible. Yes, it’s a hassle to update Java and Adobe Acrobat every flipping week, and some updatesmay occasionally break things. Do it anyway.

Installing anti-virus software isn’t the safety net it used to be, thanks to the increase in ‘zero day’ threats that appear before AV companies can update their software. But they’ll still stop more than 90 percent to the threats you’re likely to encounter. So get some. If you’re unwilling to pony up $30 to $60 a year for BitDefender or Intel’s McAfee, you can download perfectly adequate solutions from AVG or Avast for free.

You know what’s an even bigger threat than malware authors and cybercrooks? You. The easiest way for an attacker to get access to your logins is to fool you into giving them to him. This is usually achieved via a “phishing” email that looks like it’s from your bank, employer, or the IRS; this email aims to lure you to a bogus site where your enter your login name and password. Once the attackers have your info, they can log into your account, then steal your information and sell it to others.

An example of a phishing email pretending to be from everyone’s favorite federal agency (Image: Phishme.com).

Some phishing attempts are crude and easy to spot; others would fool all but an expert. But the defense is easy: Just don’t click on any links inside an email. If you got an email purportedly from your bank, type your banks’ web address into the browser and go there directly.

Read: How to Protect Yourself from Phishing

Rule #4: Don’t touch that file

The other way scammers get you is by sending a bogus attachment, like an invoice or a contract for something you allegedly ordered. Opening the document usually infects your computer. If you don’t recognize the sender, just delete the email. If the message appears to come from a friend or colleague, make triple-sure they actually sent it to you before you open it.

Rule #5: Become a cyber-savvy parent

Sexting, cyberbullies, and cat-fishing — being a parent of an Internet-age kid isn’t easy. The best thing you can do is educate yourself. The Connect Safely site has a slew of helpful, non-hysterical guides to keeping kids safe from cyberbullies, dealing with SnapChat and Instagram, how to handle the mobile phone conundrum, and a ton more. Common Sense Media is also an excellent resource for how to be cyber parent, with recommendations for age-appropriate sites, apps, games, and the like.

Read: Keep Your Kids Safe from the Big Bad Web, No Matter Their Age

Rule #6: Don’t be a boob about the Tubes

If your kids are online, it’s pretty certain they’re spending a lot of time on YouTube and other video sites. Most of that content is innocent (if mind numbing); some of it isn’t. You need to at least be aware of what they’re watching and put some controls on it. If they’re still in single digits, you might to install Google’s YouTube Kids app on their tablets or phones.

Read: 10 Ways to Make YouTube Safer for Kids

Rule #7: Don’t install that new video player

Just like in real life, most of the bad guys on the Internet hang out in dicey neighborhoods – like adult sites, bit torrent search engines, and pirate Internet TV stations. At some point nearly all of them will pop up a message saying that your Flash player is out of date or that you need to install a new video player to watch whatever it is you’re trying to watch. Don’t do that.

This pirate site wants me to update Flash, but it’s really trying to get me to install malware. (Also: Don’t use Flash if you can avoid it.)

Best case scenario is you’ve installed adware — software that will splatter advertisements over all of your web pages. Worst case, somebody just made your computer part of their zombie army.

Read: What Is Adobe Flash, and How Can You Get Rid of It?

Rule #8: Use a password manager

Yes, passwords suck. But until we get a better replacement, we’re stuck with them. So do yourself a favor and use a password manager like 1Password, Dashlane, or Lastpass. They will both act as a password vault, storing all your thousands of logins for different sites, as well as auto-generate fiendishly difficult-to-crack passwords on your behalf. Just don’t forget the master password to your vault, or you’re screwed. (Tip: Use a song lyric or some other easy-to-remember-yet-unique phrase for your password, the longer the better.) They aren’t foolproof, but they’re better than using “123456” for everything.

Read: Weekend Project: Fix Your Passwords

Rule #9: Protect your logins

One way to find out if your password has been stolen is to see if someone is logging into your accounts from an unknown machine. With more and more sites using Facebook and Twitter as ways to prove you are who you say you are, this becomes especially more important.

Facebook has a Security Checkup page you can use to see if someone else has been logging into your Facebook account and log out of any unknown ones with a click. Companies like Apple, Google, Twitter and Yahoo have deployed so-called “two factor” (or “two-step”) authentication, which requires you to enter an additional piece of information when logging in from an unfamiliar device — usually a 4 or 6 digit code sent via text to your phone. If you think someone else might have access to your accounts, it’s a good idea to change your password and then implement two-factor.

Read: A Cheat Sheet for Securing Your Accounts with Two-Step Verification

Rule #10: Secure all your Wi-Fi passwords

Most people don’t realize this, but your home Wi-Fi actually has two passwords. One is for the network — that’s the one you type when you log on from a new device. The other password is for the router; this allows you to go in and change network settings (like your Wi-Fi password). Most people remember to change the first set of logins but not the second, and the router defaults are widely known (usually “admin” and “password”). So anyone within range of your home network could log into your router, change the settings, lock you out of it if they wanted to, or simply capture all the information flowing out of your network. Not good.

(Image: Cisco)

You’ll want to change your router’s defaults. Instructions vary depending on the router, so you’ll need to visit the manufacturer’s Web site and search for “change router admin password.” (You can find instructions forNetgear, Linksys, and Belkin here).

Read: Change Your Wi-Fi Password to Something You’ll Actually Remember

Rule #11: Don’t get sucked in by fake Wi-Fi hotspots

If you’re logging on from a crowded cafe or an airport lounge, you’ll probably see “free” Wi-Fi hotspots galore. Some are legit, some are definitely bogus. You’ll want to find out if in fact the cafe or lounge offers free Wi-Fi, and what the network name is, before you log on. Otherwise you could be handing all your Internet traffic to some rogue access point or that creep behind you with a laptop. When in doubt, pony up for a legit public hotspot you know is secure.

Rule #12: Use an encrypted connection in public

Even if you’re on a legit public Wi-Fi network, someone else on the same network could snoop on your data unless you take the right precautions. First, if you are logging onto your Webmail or account, make sure to use the encrypted version of the Web site – the address always starts withhttps (not http). Otherwise, anything you type is sent in plain text and can be captured by someone else on the same network.

A good explanation of how 2-step authentication works, courtesy of Google.

The best option, if you can: Connect to the Internet using a virtual private network (VPN), especially if you’re dialing into work. This creates an end-to-end encrypted connection between you and the Net, making it virtually impossible for anyone to spy on you.

Rule #13: Technology can help — but it can’t solve everything

If you’ve got kids at home, technology can give you a handle on what they’re doing on the Net. Circle can monitor every device on your home network and let you set rules about where and when kids can access the Net (if you have an iPhone — Android support is coming later this year). The upcoming Screen app will let you control all your home devices from your phone. Norton Online Family Premier can cordon off the nastier parts of the net and give you a window into their chat conversations and video consumption. And of course, anti-malware software can help fight off the nasties for everyone.

Ultimately, though, the burden is on you. Like liberty, the price of Internet safety is eternal vigilance. And not just on one day each year.

Source: Yahoo Tech

Comments