The internet user more than 4.5 billion now, while social media users have passed the 3.8 billion mark. The world’s population is already online nearly 60 percent, and the latest tendency suggests that more than half of the world’s total population will use social media by the midst of this year.
Internet safety or "e-safety" has become an initial topic in our digital world and includes knowing about one’s Internet privacy and how one’s conduct can support a good interaction with the use of the Internet.
The eight tips for stay safe online from the cyber security experts at the Cyber Security Agency of Singapore, Akamai, Check Point and HackerOne.
For phishing attacks do not irregularly open links or files sent via e-mail or social media.
Check the URL of links to confirm they are legal before clicking. Be extra careful if an offer or deal sounds too good to be true. Do not answer with personal information such as passwords or bank account details.
To use powerful passwords have a mix of random alphanumeric characters and symbols that are stronger to crack by brute-force attacks.
Though powerful passwords can be hard to remember. You must follow the password rule of the experts recommend and do not reuse passwords for your different accounts.
Use a password manager to generate a password for the solution and automatically fulfill the passwords for your accounts. You need to remember a master password.
For example, Google's Chrome browser appears with a built-in password manager. It has a Password Checkup feature - started last year for Android and the Web - that can check saved passwords to see if they had been leaked or compromised in past breaches.
Substitute, choose biometric authentication methods such as face recognition or fingerprint if available.
Enable two-factor authentication - a more layer of identity verification through a one-time password or biometric authentication - to secure your online accounts.
Journalists, activists, and business leaders is the victim of cyber criminals. For those Google has an Advanced Protection Program that offers extensive security for personal Google accounts.
The users have must use a physical security token - on top of a password - to sign in to their Google accounts. Google also limits access to Gmail and Google Drive files to its own apps and select third-party apps, thus decreasing the scope of a malicious app gaining access.
Always detain cyber attacks that utilize software bugs by keeping your apps and software updated with the latest patches. Enable automatic updates, which are usually scheduled to occur in the midst of the night to avoid disruption.
Malware can cloak itself as legal apps to get past your obstacles. Hence, escape downloading apps via links in emails or social media. Must Use the Apple App Store or the Google Play Store instead of unofficial third-party stores or websites.
Even though the vast majority of apps from the official app stores are safe, there have been cases where malware has gotten past Apple's and Google's checks.
To relive the damage that could be done by such apps, scrutinize the authorization requested by a new app and refuse unnecessary ones. For example, do not need to access a weather app to your photos or phone call function.
VPN means a virtual private network. VPN creates an encrypted secure connection over the Internet. It is easy to handle if you are using a public or unsecured Wi-Fi connection.
Various PC makers have included physical privacy shutters to the front camera of laptops to block prying eyes in the event of the computer being compromised by malware. Or you can add a gum tape over the camera.
If you want to disable the microphone in Windows 10 PCs, go to Device Manager, Audio inputs and outputs, right-click Microphone and select Disable.
Also want to disable Mac computers microphone, then go to System Preferences, Security & Privacy, click Privacy. Select Microphone to change an app's access to it.
If you take all deducible alerts, it is still probable for your devices to tolerate from a ransomware attack that locks a device's contents unless a ransom is paid.
It's necessary that you reserve your data regularly to many places to relieve data loss.