Cybersecurity Essentials that Just Might Save Your Life

Cybersecurity Essentials that Just Might Save Your Life

It’s the era of the Internet of things(IoT), driverless cars that talk to automated garage doors, and drones that deliver packages. It appears that machines do a lot of talking these days.

Why should you be concerned about these talkative devices and sensors? If you've seen the movie "I-Robot", then you know what happens when smart machines are in charge. Ok, I'm only kidding, the reality we face is not as dramatic as sci-fi movies portray, but it could be just as dangerous.

That's why I've compiled a list of safe practices that every internet user must adopt to stay safe online.

1. Protect Your Data

Protect your data online and offline. Be careful about how you respond to unsolicited calls and emails. Try not to share debit card details or anything personal. No matter who the caller claims to be, don’t share any passwords, or other private details. If the person is genuinely from a service you’ve subscribed to, then surely they can afford to call back later.

"Later", being a time when you’ve confirmed the identity of the caller directly from the service provider. By service provider, I’m referring to banks, internet service providers, or any other subscription service. It is important to also state here that you should always do your own research.

The more you know about the services and promos your bank or subscription service is offering, the easier it is for you to detect lies when you receive unsolicited emails, calls, and text messages from phishers.

Lastly, don’t be too quick to provide your email address or other personal details to apps or other internet services.

2. Use VPNs

VPN stands for Virtual private network. A virtual private network is a service that provides a secure and encrypted connection for its users by hiding their IP addresses. Think of a VPN as your personal invisibility cloak. It enables you to have a high degree of anonymity online and allows you to go to places you normally wouldn’t be allowed to if the gatekeepers could see you. Pretty neat right?

It’s mostly legal to use VPNs. I used 'mostly' because some countries that censor websites or outrightly ban access to external networks also have bans placed on VPN use. China has a ban on most VPNsbut it has a list of state-allowed VPNs. That defeats the purpose of using a VPN because they can track the users of such sanctioned VPNs.

If you’re using a VPN, you’re doing yourself a world of good, as your VPN provides you with its own IP address and any attack would be directed at its own secure servers, not your computer or mobile device.

3. Use Password Managers

There are a number of secure and easy-to-use password managers out there in which you can safely store your passwords. A good number of these managers are paid products, but there are free ones such as Bitwarden (I use this).

Bitwarden uses salt hashing (a really cool way of encrypting your data such that in the unlikely event of a breach, the attackers would only see gibberish and not your actual password), and other technologies to keep your data safe and secure.

Additionally, Bitwarden randomly generates safe passwords for you. A rule of thumb for the creation of safe passwords is that “passwords shouldn’t be memorable”. If you can easily remember your password, then it’s probably not as strong or as safe as you think because hackers use super complex algorithms to crack passwords. A password manager such as Bitwarden is a safe choice, always.

4. Use Authenticators

You probably are used to the not-so-recent trend in registering for online services in which you have to set up two-factor authentication. Well, it’s a pretty good trend.

But, there’s a catch: if you use your mobile number or email address as your second factor, you’re at risk of a man-in-the-middle(MITM) attack.

A man-in-the-middle attack is one in which an attacker is able to intercept communication between two parties. The MITM then alters the messages as they desire in order to gain access to secure data. This is where the use of authenticators comes in handy.

Authenticators work by generating a passcode that is created from a secret code shared between you and the authentication service. Examples of authentication services are the Google Authenticator app, Kraken, and Bitwarden.

5. Practice Safe Online Habits

Safe online habits such as being cautious about the links you click on, checking and double-checking websites you visit to be sure they aren’t cloned versions, and keeping your personal life as far away as possible from the online space are vital in ensuring online attackers can’t get to you through phishing attacks.

Phishing is a method used to maliciously obtain valuable information from unsuspecting individuals. An attacker sends a fraudulent message designed to trick the target into revealing sensitive information. This information is used to gain access to the individual's private accounts (bank, social media, crypto wallets, etc).

Other Helpful Cybersecurity Practices

  • Create multiple emails for different purposes: Use one for all your financial processes, use another for social media, and then use another for the random services you sign up for daily.
  • Keep your social media accounts as private as possible: keep important details off of social media. Details like addresses, dates, phone numbers, emails, and your location.
  • Lastly, deep fakes are becoming a thing. The likeness of individuals—their faces, voices, and mannerisms—can be captured and used to impersonate them. As much as it depends on you, keep pictures and videos away from the online space.