7 tips to improve Cybersecurity for users
The Internet is a space that has become a place full of threats such as malware , ransomware and even phishing attacks . In this post, we will tell you some tips to know how to improve Cybersecurity for users.
In this post you will find: hide
1 How to improve Cybersecurity for users
1.1 Use two-step authentication (2FA)
1.2 Think twice before clicking
1.3 Use strong and uncrackable passwords
1.4 Back up your data
1.5 Connect securely
1.6 Pay attention to your posts
How to improve Cybersecurity for users
Perhaps you already use some of the suggestions that we propose, however, it never hurts to strengthen the Cybersecurity of your accounts and tools. Your personal data is the most valuable thing you can have on the network and it is necessary to protect it.
Uses two-step authentication (2FA)
It is very important to have a strong password, but it is even more important to have two-factor authentication. This method provides an extra layer of security for your accounts. In the event that a cybercriminal guesses your password, they would still have to overcome one more barrier of protection to gain access.
Two-step authentication is premised on the use of a second device to confirm that it is you who is accessing. For this, two models are used, one of sending a key through SMS and the other model is called TOTP: Time-based One Time Password, or Password of a single use based on time.
The most used model is TOTP with applications such as Google Authenticator, where a QR code provided by your account is used, which stores a number and this will be the basis for calculating all your codes with variables such as the date and time you request it. Through this algorithm every 15 seconds, Google Authenticator will provide you with a new code.
think twice before clicking
The possibility of clicking does not imply that you have to do it obligatorily. Malicious links can cause damage such as data theft, password theft, or bank details.
This happens, above all, through emails. You need to make sure that the sender is trusted or official. There are different varieties of malware that enter via email attachments.
One of the most common attacks that originate from a simple click is the Ryuk Ransomware , through which a remote connection is generated, achieved in an RDP attack. With this, the cybercriminal creates an executable to start encrypting all the files on the computer and ask for money in bitcoins in exchange for removing the encryption of the information.
Use strong and uncrackable passwords
Surely you have ever been asked to create a password that contains uppercase and lowercase letters, numbers and other special symbols. They do not ask for it in vain, since it is one of the best ways to create a strong and complex protection to use our accounts safely on the network. Some recommendations to strengthen your passwords are:
- Create passwords between 10 and 15 characters
- Use random alphanumeric characters
- Change your passwords every 3 months
- Use password managers like 1password or Lastpass to store them and generate new ones
Make a backup of your data
Nowadays, it is very easy and affordable to store data. It is recommended to make a backup in a physical location and another in the cloud. It is necessary to remember that cyber threats do not always want to steal your data, sometimes the final objective is to encrypt or delete it. With a backup you will be protected in any of the cases.
If you want to create a server yourself to store your data at home, a good solution is to use a Raspberry with a tool like OpenVault and an internet connection to always keep your copies updated.
Many people know this Cybersecurity advice, but there are still a large number who do not follow it. When you don’t have an Internet connection, it’s tempting to connect your device to an unsecured connection, that is, to a Wi-Fi network without a password, but when you know the risks, it’s not worth it. Only connect to private networks, especially when handling sensitive information.
Pay attention to your posts
This tip focuses on social media. You must be careful with the information you share on Twitter, Facebook, Instagram or on any network where people can read you. You cannot fall into mistakes that could make you lose data or provide information that is used to impersonate your identity.
We have shared some tips that can help how to improve Cybersecurity for users. Now is the time to enhance your Cybersecurity knowledge.
If you want to deepen your knowledge about Cybersecurity, with our Cybersecurity Bootcamp you will master all the tools and technologies of the sector in less than 7 months. Make the network a safe place!