Six things you do every day on the Internet that can leave you unprotected – Check Point Blog

Six things you do every day on the Internet that can leave you unprotected - Check Point Blog

  • Even though the Internet has been with us for 50 years now, we keep repeating basic mistakes like using weak passwords, avoiding updates or browsing unsecured pages that open the doors of our devices to cyber threats.

Nowadays we cannot live without the Internet, a fundamental resource among the new generations. Do you remember looking up information in an encyclopedia or going to a travel agency to buy a plane ticket or make a hotel reservation? It seems like centuries ago, but the truth is that the network of networks has changed the way we carry out many activities and has opened the door to new possibilities that allow us, for example, to work from anywhere or make a transfer from our phone in just one click.

Unfortunately, this unstoppable evolution is also present in the many threats posed by cybercriminals. We have gone from viruses distributed on floppy disks and Morris, the first worm to infect the Internet in 1988, to the emergence of Trojans, spyware and ransomware, the main protagonists of today’s cybercrime scene. According to the 2023 Security Report from Check Point Software Technologies Ltd. (NASDAQ: CHKP), a leading global cybersecurity vendor, cyberattacks increased by 38% in 2022 compared to the previous year, with an average of 1,168 attacks per week per year. organization and a situation that seems destined to continue to worsen in the coming years.

All this makes it clear that we must be prepared to face these threats, which is why Check Point Software takes this World Internet Day as an opportunity to remind us of the “bad habits” that we continue to maintain and which affect our digital security:

  • Forgotten passwords: this is one of the most common mistakes, yet one of the practices that most affects the maintenance of proper computer security. We all find it easier to recycle passwords and use the same for work and personal emails, but we’re putting important data at risk. It’s also very common to share them, such as Netflix or Spotify passwords, and we often write them down or send them in a message or email to family or close friends. This reality translates into millions of users each year having their accounts hacked because they don’t take care of their passwords. To avoid this, it is advisable to create strong passwords, with at least 12 characters and a combination of uppercase and lowercase letters, numbers and special characters. Likewise, it is always recommended to update them every few months and not to reuse them across multiple platforms or different accounts.
  • Update, update, update: all systems and devices have regular updates designed not only to improve or fix usability, but also to patch any vulnerabilities. The update message often appears at inconvenient times or when we don’t have a Wi-Fi connection and we usually end up postponing or even ignoring its installation, unknowingly leaving an open door for cyberattacks. By simply keeping our devices up to date, we can avoid many of the vulnerabilities that can occur.
  • Falling prey to misinformation: while most cyberattacks today focus on data theft, there has recently been a growth in hacktivist practices and other state-related threats. This type of practice often includes spreading disinformation with fake news or partisan and incomplete messages that exploit the emotional side of users to generate discord. For this reason, it is advisable to use different sources when informing yourself, as well as check for any chain news or messages before falling into practices such as mass dissemination. One of the main pillars of internet safety is common sense.
  • Using free wireless networks: to avoid running out of data, it is increasingly common to browse hot spots and free Wi-Fi networks of restaurants, airports, train or subway stations, hotels and even public or private transport. However, security researchers have shown on numerous occasions that these types of wireless networks have little or no security. It is recommended not to access an unknown network, but if necessary, limit its use to basic browsing, avoid entering passwords or using sensitive applications such as payment platforms or banking access.
  • Accept the privacy policies and permissions without reviewing them: who ever reads the terms and conditions of data use? These long and difficult to understand texts encourage most people to agree to all terms of use for any application without further ado. While this allows us to start enjoying them faster, it can lead to a serious security problem and even a breach of all our data. On the one hand, cybercriminals often use some popular applications or programs to spread their malicious code, while some malicious developers hide some stipulations for the transfer of permissions to collect, store and even exchange these data. By taking a few moments to review permissions and terms before installing a program, we can avoid falling victim to deception or exposure of our personal information.
  • Browsing and trusting unsafe websites: one way to identify this type of fraudulent site is to look for small errors such as typos, poorly written text, or the presence of misleading or poor quality images. However, the most effective method is undoubtedly URL analysis, with security indicators such as SSL certificates (indicated by the presence of a padlock next to the web address); or warnings, such as the presence of irregular characters or subdomains.

Although the Internet is still a fairly young tool, we already have a lot of experience at our disposal to avoid becoming a victim of cyber attacks. Again, we must ask for education and common sense, as education and knowledge are key to achieving a safe digital space for all.

#day #Internet #leave #unprotected #Check #Point #Blog

Leave a Reply

Your email address will not be published. Required fields are marked *