Are you really sure you are hacker-proof? Here are Assoprovider's 10 tips on online security to protect your data and your money.
The real security emergency is online. According to some estimates, cyber attacks increased by 38% in 2018. In the vast majority of cases (4 out of 5), hacker attacks aim to extort money from victims: this is the case with computers "locked" by ransomware, which are unlocked only upon ransom payment, or with secret information captured without the users' knowledge that could end up on the web if the victims do not pay substantial sums of money. However, phishing is also on the rise, aiming to steal the victim's data, and attacks on the healthcare data sector (+99%).
How to defend yourself? Assoprovider offers you ten tips to start with.
-
Be careful with emails and private messages
It may seem trivial to repeat it, but it is essential: NEVER click on links and attachments that seem suspicious. NEVER. Always verify who the recipient is: sometimes, in emails, it is practiced the so-called phishing, when a user pretends to be someone else, hoping to make you "take the bait". It often happens with banks or postal services: they tell you they had to block your card, invite you to enter your access data, and steal your credentials. (and therefore the money).
Always pay attention to the sender, therefore. Sometimes, hackers also exploit the identities of your friends: on the web, therefore, trust no one. To gain an additional clue about the security of the message, analyze the link on which you were asked to click: if the address starts with Https (where the s is crucial), then it is probably a secure site.
This concerns the messages received. As for those sent, there are other risks such as sexting: always be cautious with the images you send. If we share intimate photos privately, there is a risk they may become public without our consent.
-
Select friends
Friend requests, follows, Skype contacts, emails: the web has now become THE place to connect. But just like in reality, not everyone who approaches us online has the best intentions. The rule is not to accept invitations from people we do not know even "in person" or who do not present themselves with an introductory message explaining their objectives.
-
Navigate safely
Just like in a city, there are safer and less safe areas on the web. There is specific content online that cybercriminals prefer to lure users into a "trap": porn sites, for example; or platforms where it is possible to download for free copyright protected content (films, TV series, and so on).
To avoid problems, it is always better to browse safely, staying away from this type of portals: sometimes just one "wrong" click is enough to unknowingly share all your data.
-
Deep Web, the dark power of the online world
Regarding shadow areas on the Internet, the dark web it is certainly the most famous. This concerns a true world apart, which can only be accessed using specific software (such as the Tor browser). Its reputation as a "dark" place is certainly deserved (just do an online search to understand what can be found here), but the dark web is actually also used for many legitimate and legal activities, which, however, require truly anonymous connections and communications protected by encrypted codes.
However, given the predominantly illegal nature of what happens here, it is advisable not to delve into it., not without full awareness of the software and dynamics that take place here.
-
Check the connection
If you don't want to be hacked, attention to public Wi-Fi connections: in airports, at bars, or in other public places, Internet connections are not always monitored with the same attention as private ones. Avoid using them if you can, or be careful when you do: for example, it's better to avoid accessing your online banking app when connected to a public network.
-
Doxxing Risk: be careful what you publish
The Network does not forget. If you think you have complete control over what you publish online, you're mistaken. Even when you delete a photo, your personal data, or a comment from a social network, it does not necessarily mean that someone has not already "stolen" it.: it takes only a few moments to take a screenshot.
The rule is: do not share anything you wouldn't want your mother or your employer to see.
In this way, you will avoid the so-called "doxxing," when friends or complete strangers steal your private information.
It is important in this regard to pay attention to privacy settings that you have set on your different profiles, choosing, for example, not to automatically accept the "tag" of other people to your photos that they publish online.
-
Apps are not a game
Due to the overwhelming success that some of them have—especially gaming ones, such as Pokémon Go or Fortnite—apps have become the preferred target of some malicious actors, not necessarily hackers in this case.
For example, there are apps with poorly transparent payment and subscription systems.: never disclose your card and online account details when you are unsure of who developed the game.
-
Filter and limit
Children and teenagers today are born with a smartphone and a tablet in hand. They often know its "secrets" better than we do, but are we sure it is a perfectly secure tool?
The best approach for adults is to discuss the topic calmly with their children or other minors for whom they are responsible. It is important to illustrate to them the risks of certain activities (such as sexting, which we have mentioned) and to guide them towards greater awareness., also to limit its use throughout the day.
One more possibility is to select for them the so-called parental control, software that restricts access to certain sites and content deemed unsuitable for a very young audience.
-
Update everything
First of all, it is necessary to equip oneself with a good antivirus (there are many available, even free ones) and update it periodically. It is advisable to schedule regular scans of PCs and smartphones to detect any viruses and malware. The recommendation to update everything also extends to the operating system used (Windows, Linus, iOS, and so on) and the applications and software we use most frequently, in order to enhance the overall security of our devices.
-
IoT: when "things" become gateways for hackers
The Internet of Things is a great opportunity, but it can also prove to be a threat. Today, almost all the "things" we have connect to the Internet: from the oven to the thermostat. However, this makes our online security more vulnerable.: every connected device is indeed a possible gateway for hacking. Also because some manufacturers have not implemented the necessary security measures.
It is possible to defend oneself from those who want to hack you, obviously. Mainly in two ways. First of all, by installing a good firewall, a barrier placed between different segments of the network, which helps protect your data. The best ones are equipped with encryption systems.
The second thing we can do – which applies to all our devices and network access and not just to IoT – is to use truly effective passwords. They must always be different, do not postpone to important dates (a piece of information that could be easily found on Facebook, for example), they must be complex and therefore contain letters, numbers, special characters. If they then form (complex) meaningful sentences, even better.


















