Home Education 5 Dangerous Cybersecurity Mistakes You Probably Make

5 Dangerous Cybersecurity Mistakes You Probably Make

Revealed: Secret words that IT professionals use to describe YOU

NEWNow you can listen to Fox News articles!

The FBIThe latest report on cybercrime online paints a sad picture. Last year, Americans lost more than $ 6.9 billion from cybercriminals.

Don’t think you’re too smart to succumb to their tricks. Even experienced people can get money before they realize what happened. Tap or click five easy effective ways to protect your smartphone.

It may be too late and you notice unexpected pop-ups or your phone heats up if you don’t use them. Here’s how to find out if your smartphone has a hacker or a spy.

Avoiding cybercriminals seems like a feat, but it doesn’t have to be that difficult. Knowledge is power. I’ll tell you through five mistakes you can make.

1. You think free means safe

Using “free” Wi-Fi can cost you more than money. Public networks are insecure and easy to hack. I’m not just talking about airports. Your local coffee shop, salon, or any place that doesn’t password protect your network makes you and your data vulnerable.

Because this network is open for use, package sniffers are readily available online that capture every keystroke you type. Think about it. Your passwords can be seen and collected by criminals.

Use VPN if you are need to access the Internet and are away from a secure wireless network. VPN uses an encrypted connection to protect against spying.

You can also use your phone as an access point. Click here for instructions for the iPhone. For steps on Android, click or click here.

2. You miss updates

Are you famous for downloading software updates but never installing them? If you frequently click “Remind me later”, you are asking for problems. Do not prevent your system from receiving the latest tools and security patches needed to combat intruders and malware.

A young girl cries late in the evening with tears in front of her laptop (iStock)

Updates are annoying when you’re in the middle of the workday, so schedule them late at night when you’re not using your computer. Click or click here to schedule updates on your Windows PC.

3. You pick up the phone when a scammer calls

Sometimes these fraud figures are very convincing. You’ll learn the city code and maybe even the first few digits, or maybe it’s your phone number. You pick up. That’s when the scammer has a chance to get into you with his claws.

Don’t answer if you see a probable scam, or any other term that reflects your operator and phone. I often hear from my national radio listeners who like to play games with phone scammers. They impose them and pretend that they are interested.

It’s not too bright. You never know if this person is recording your voice for nefarious purposes or even making a deep fake audio recording about you later.

Do you like what you read? Find a radio station near me that broadcasts my show. You can also get a show podcast without advertising.

4. You have a bunch of old unused accounts

The more accounts you have online, the more you are at risk when hackers call. With a new hack around every corner your usernames and passwords are not secure.

The first step is to comb your email inbox and phone to find accounts you no longer use. Then get rid of them. This is not always the easiest.

FILE - Facebook and WhatsApp icons on iPhone in Gelsenkirchen, Germany, November 15, 2018.

FILE – Facebook and WhatsApp icons on iPhone in Gelsenkirchen, Germany, November 15, 2018.
(AP Photo / Martin Meissner, File)

Some accounts cannot be deleted, and some sites hide their deletion links, and you need to dig deep enough to find them. Click or click to find a tool that makes it easy to find exactly where to cancel online accounts.

It will take some time, but it is worth it. If the site you once used announces the imminent hacking of data, you’ll be glad you did.

5. You press consent

When was the last time you read the terms of the site or service? You are not alone. This may mean that you allow companies to collect your personal information.

I don’t suggest you read every word because I know it’s unrealistic. But there is a smart way to check at least a few things.

The next time you encounter a privacy policy, a terms page, or a lengthy service agreement, use a keyboard shortcut to search for specific words.

  • On a Windows PC use Control + F.
  • On a Mac use Command + F.

Now enter terms like “third party”, “GPS”, “tracking” and “data”. You will soon see how your information is used.

A woman in front of a computer.

A woman in front of a computer.

Bonus tip: Wi-Fi on the Moon, Russian cyberattacks and a Google tip to save money on gas

Did you know that Wi-Fi is coming to the moon? Yes, indeed. In this episode of Kim Komando Explains I will teach you to find a seat in the airline with the most legroom, save money on gas and a few other technical tips that you will use over and over again. I also have an action plan that can be used to protect myself from Russian cyberattacks.

Check out my “Kim Team Explains” podcast atApple, Google Podcasts, Spotifyor your favorite podcast player.

Listen to podcasts here or where you get podcasts. Just find my last name “Team”.

What questions about the digital lifestyle do you have? Call Kim’s national radio show and click or click here to find it on your local radio station. You can listen or watch The Kim Commando Show on your phone, tablet, TV or computer. Either click or click here to get Kim’s free podcasts.

Copyright 2022, WestStar Multimedia Entertainment. All rights reserved. By clicking on the purchase links, you are supporting my research. As an Amazon employee, I get a small commission from qualified purchases. I only recommend products that I believe in.

Learn about all the latest technology on The Kim Commando Show, the largest weekend radio talk show in the country. Kim takes calls and gives advice on the modern digital lifestyle, from smartphones and tablets to hacking online privacy and data. To get her daily tips, free newsletters and more, visit her website at Komando.com.

Source link

Previous articleAs working hours return, like buying new work clothes on a budget
Next article39 million students left the college without receiving a certificate, the report said