SlideShare a Scribd company logo
1 of 4
Download to read offline
10 Important Internet Security Habits To be Followed But Are Not 
Summary 
Internet security in today's digital days takes more than just an anti-malware software. Giving 
your digital life a complete security overhaul is easy and simple. The following are the 10 most 
fundamental things you do to safeguard your computer and other devices. 
Use a Strong Password Manager 
 Using a long string of random alphabets, numerals, and special characters as passwords for 
all your critical accounts is painful. 
 Complex passwords are difficult to remember and to crack, which is why using a password 
manager that generates and saves those passwords is so important. 
 Password managers are user friendly and most are cross-platform, and give you access to 
the information on computers and mobile devices alike. 
Two-factor authentication 
 Two-factor authentication is the second step that strengthens passwords. 
 This vital security measure bases itself on the “two things to prove your identity” approach: 
(1) something you know; (2) something you have. 
 That is your regular password (something you know), and the one-time code (something 
you have) generated via text message you need to enter prior to logging in. 
 Though not foolproof, two-factor authentication is far stronger than using passwords 
alone. 
Additional Data Back Up 
 Data backup may not seem an essential security matter, but protecting your information 
against faulty hardware or a harmful virus is extremely important. 
 Online backup is an easy way to get off site protection. The legion of services include Mozy, 
Backblaze, CrashPlan, and iDrive. 
Create a Private Internet Passage 
 Majority of public, shared Wi-Fi networks are wide-open and HTTPS devoid.
 Though this is checked to an extent by logging into sites using HTTPS, it is not a perfect 
solution. 
 Ideally, you should use virtual private network (VPN) to create an encoded passage between 
your device and the Web. 
Safeguard Router 
 Home Wi-Fi router is the most critical Internet connection in your life, since it is the place 
where you are most likely to view sensitive information online (e.g., bank accounts). 
 For the best home Wi-Fi security, use Wi-Fi Protected Access version 2 (WPA2) 
encryption and a randomly generated password of at least 30 characters long. 
 The longer and random the Wi-Fi security password is , the harder it is to crack. If you 
cannot remember the long password, save it in your password manager. Change the user 
name and password for your router’s admin panel regularly. 
Do Not Link All Your Accounts 
 Another weak spot in Internet security: Mail accounts that receive password-recovery 
messages, in an event of a lockout. Recovery accounts serve as prime targets for attackers 
looking to pierce your online life. 
 Do not daisy-chain all your important accounts. Example, Gmail address is the recovery 
address for your Outlook address, and Outlook is the recovery address for Facebook. 
Visit the video to know to secure your user data from Hackers: 
https://www.youtube.com/watch?v=MP18ztIpTo4 
If Possible, Stop Using Java 
 Oracle’s Java offers a legion of Internet security vulnerabilities. Good news is that it is no 
more a user critical software. 
 Last January, the Computer Emergency Response Team (US-CERT) recommended that all 
computer users to disable Java unless it was very important for them.
Encode everything 
 Encrypting websites with browser plug-ins will keep your login details and personal 
information protected. 
 Encrypt external devices, external hard drives, and backups too.
Anti-malware scanner 
 To stay well protected, equip your computer with two security software: one antivirus app 
and one anti-malware scanner. 
 The antivirus app is always-on solutions scanning incoming files and websites for malware 
and will not necessarily catch or remove everything. 
 So, it is better run an anti-malware program that had better chance of catching active 
Internet problems. 
Secure Webcam 
 It is shocking to know that PCs have the capability to see and hear us through webcams 
and microphones. 
 An easy defense against peeping webcams is the plain adhesive tape. Just take a small 
adhesive piece cover the lens. Take it off when you use your webcam, replace it later. You 
can even use a paper instead of an adhesive. 
 Tape has the added advantage of being impermeable to software attacks.

More Related Content

What's hot

A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be remembered
wolverine0614
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
Mohamed Radji
 

What's hot (20)

5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today
 
Hacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect YourselfHacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect Yourself
 
WEB SECURITY
WEB SECURITYWEB SECURITY
WEB SECURITY
 
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftWatch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011
 
Mbs r33 b
Mbs r33 bMbs r33 b
Mbs r33 b
 
Code protection
Code protectionCode protection
Code protection
 
Network security threats and solutions
Network security threats and solutionsNetwork security threats and solutions
Network security threats and solutions
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Security
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
The Benefits of a Network Security Plan
The Benefits of a Network Security PlanThe Benefits of a Network Security Plan
The Benefits of a Network Security Plan
 
Web security 2012
Web security 2012Web security 2012
Web security 2012
 
Network security
Network securityNetwork security
Network security
 
A day that will be remembered
A day that will be rememberedA day that will be remembered
A day that will be remembered
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
Cyber security
Cyber securityCyber security
Cyber security
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 

Similar to The Safest Way To Interact Online

Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
kris harden
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
leahg118
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
HAYDEECAYDA
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
Service2Media
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal
 
Information security questions
Information security questions Information security questions
Information security questions
gamemaker762
 

Similar to The Safest Way To Interact Online (20)

10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptxCheck-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
Check-Computer-Networks-to-Ensure-Safe-Operation-Johua-2nd.pptx
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer Security
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Internet security
Internet securityInternet security
Internet security
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Hamza
HamzaHamza
Hamza
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Webinar Security: Apps of Steel transcription
Webinar Security:  Apps of Steel transcriptionWebinar Security:  Apps of Steel transcription
Webinar Security: Apps of Steel transcription
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
Security Tips To Keep Your Laptop Safe
Security Tips To Keep Your Laptop SafeSecurity Tips To Keep Your Laptop Safe
Security Tips To Keep Your Laptop Safe
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Information security questions
Information security questions Information security questions
Information security questions
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 

Recently uploaded

pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
F
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 

Recently uploaded (20)

Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
 
Delivery in 20 Mins Call Girls Cuttack 9332606886 HOT & SEXY Models beautifu...
Delivery in 20 Mins Call Girls Cuttack  9332606886 HOT & SEXY Models beautifu...Delivery in 20 Mins Call Girls Cuttack  9332606886 HOT & SEXY Models beautifu...
Delivery in 20 Mins Call Girls Cuttack 9332606886 HOT & SEXY Models beautifu...
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
 
Dubai Call Girls First Class O525547819 Call Girls Dubai Hot New Girlfriend
Dubai Call Girls First Class O525547819 Call Girls Dubai Hot New GirlfriendDubai Call Girls First Class O525547819 Call Girls Dubai Hot New Girlfriend
Dubai Call Girls First Class O525547819 Call Girls Dubai Hot New Girlfriend
 
Local Call Girls in Jharsuguda 9332606886 HOT & SEXY Models beautiful and ch...
Local Call Girls in Jharsuguda  9332606886 HOT & SEXY Models beautiful and ch...Local Call Girls in Jharsuguda  9332606886 HOT & SEXY Models beautiful and ch...
Local Call Girls in Jharsuguda 9332606886 HOT & SEXY Models beautiful and ch...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 

The Safest Way To Interact Online

  • 1. 10 Important Internet Security Habits To be Followed But Are Not Summary Internet security in today's digital days takes more than just an anti-malware software. Giving your digital life a complete security overhaul is easy and simple. The following are the 10 most fundamental things you do to safeguard your computer and other devices. Use a Strong Password Manager  Using a long string of random alphabets, numerals, and special characters as passwords for all your critical accounts is painful.  Complex passwords are difficult to remember and to crack, which is why using a password manager that generates and saves those passwords is so important.  Password managers are user friendly and most are cross-platform, and give you access to the information on computers and mobile devices alike. Two-factor authentication  Two-factor authentication is the second step that strengthens passwords.  This vital security measure bases itself on the “two things to prove your identity” approach: (1) something you know; (2) something you have.  That is your regular password (something you know), and the one-time code (something you have) generated via text message you need to enter prior to logging in.  Though not foolproof, two-factor authentication is far stronger than using passwords alone. Additional Data Back Up  Data backup may not seem an essential security matter, but protecting your information against faulty hardware or a harmful virus is extremely important.  Online backup is an easy way to get off site protection. The legion of services include Mozy, Backblaze, CrashPlan, and iDrive. Create a Private Internet Passage  Majority of public, shared Wi-Fi networks are wide-open and HTTPS devoid.
  • 2.  Though this is checked to an extent by logging into sites using HTTPS, it is not a perfect solution.  Ideally, you should use virtual private network (VPN) to create an encoded passage between your device and the Web. Safeguard Router  Home Wi-Fi router is the most critical Internet connection in your life, since it is the place where you are most likely to view sensitive information online (e.g., bank accounts).  For the best home Wi-Fi security, use Wi-Fi Protected Access version 2 (WPA2) encryption and a randomly generated password of at least 30 characters long.  The longer and random the Wi-Fi security password is , the harder it is to crack. If you cannot remember the long password, save it in your password manager. Change the user name and password for your router’s admin panel regularly. Do Not Link All Your Accounts  Another weak spot in Internet security: Mail accounts that receive password-recovery messages, in an event of a lockout. Recovery accounts serve as prime targets for attackers looking to pierce your online life.  Do not daisy-chain all your important accounts. Example, Gmail address is the recovery address for your Outlook address, and Outlook is the recovery address for Facebook. Visit the video to know to secure your user data from Hackers: https://www.youtube.com/watch?v=MP18ztIpTo4 If Possible, Stop Using Java  Oracle’s Java offers a legion of Internet security vulnerabilities. Good news is that it is no more a user critical software.  Last January, the Computer Emergency Response Team (US-CERT) recommended that all computer users to disable Java unless it was very important for them.
  • 3. Encode everything  Encrypting websites with browser plug-ins will keep your login details and personal information protected.  Encrypt external devices, external hard drives, and backups too.
  • 4. Anti-malware scanner  To stay well protected, equip your computer with two security software: one antivirus app and one anti-malware scanner.  The antivirus app is always-on solutions scanning incoming files and websites for malware and will not necessarily catch or remove everything.  So, it is better run an anti-malware program that had better chance of catching active Internet problems. Secure Webcam  It is shocking to know that PCs have the capability to see and hear us through webcams and microphones.  An easy defense against peeping webcams is the plain adhesive tape. Just take a small adhesive piece cover the lens. Take it off when you use your webcam, replace it later. You can even use a paper instead of an adhesive.  Tape has the added advantage of being impermeable to software attacks.