While the net is a high-quality, resourceful, and exceedingly practical resource, it’s also an unbelievably dangerous and horrifying network. Hence why we’ve got Stay Smart Online Week, the purpose of which is to promote proper internet safety and to keep you up to date with the cutting-edge in cyber safety protocols. Here at EFTM, we take this very seriously – so we’ve determined to put down our pinnacle five suggestions to live safely online.
TIP #1 – USE STRONG PASSWORDS
I recognize this seems like a cop-out, to begin with; however, please pay attention to me out of the affection of God. 12 months in the past, Trevor published this piece detailing not only the most effective 25 most common passwords, but also how to create a robust one. For a brief recap, come up with more than one random phrase, look around you now, and call 3 gadgets.
- Bottle
- Torch
- Speaker
Now those three phrases are exceptional because they’re, first of all, no longer used generally together. Now integrate them. Bottletorchspeaker. Next, capitalize a few random letters. BoTtletorChspeaKer. Then add a character and numbers. BoTtletor%Chspea23KerThat seems ridiculous. You’ll in no way recollect it. Actually, that’s not real. After just a few goes, you’ll discover that it is exceedingly smooth. And because of the complexity and the period, it’s an amazingly strong password.

TIP #2 – NEVER CLICK A SUSPICIOUS LINK
Something that has to be understood approximately cybersecurity and hacking is that it’s nothing in any respect, just like the films. Unlike the scenes of Hugh Jackman typing furiously on keyboards inside the Swordfish film, hacking is significantly more social engineering than its far technical prowess. Social engineering is defined as “the use of deception to control individuals into divulging personal or personal records that may be used for fraudulent purposes. “
One of the quality methods to discover a sketchy hyperlink is to test the preview – whilst hovering over a link, inside the backside left of your window, you’ll see the cope with that link refers to; Before you click a hyperlink, have an actual brief look down and make sure you’re about to be redirected to an internet site which you know and believe. Also, along the social engineering lines, text messages consisting of this one are getting increasingly more unusual;
A text obtained using the EFTM reader, Michael F.
That right there – that’s a scam. Your financial institution will NEVER text you a hyperlink for something like this. Recent records endorse as a great deal as ninety-seven % of all hacking is accomplished through social engineering, which is to say, if you successfully pick out a suspicious e-mail, website, or more especially a hyperlink, you’re most effective prone to be the last three % of technical hacks. This leads me to my next tip…
TIP #3 – USE PROACTIVE ANTI-VIRUS SOFTWARE
There are two approaches to using anti-virus: proactively and reactively. A reactive approach to anti-virus, even if inexpensive, additionally leaves you liable to attack. It works in this kind of manner that you periodically test your laptop for viruses, generally with free or reasonably-priced software.
A lively technique requires buying anti-virus software that continuously monitors and prevents attacks on your laptop. Solutions encompass Trend Micro, McAfee, and Norton. There are many, many more. However, those are the primary three, which you’ll now not only listen to loads approximately but can also be capable of getting a whole lot of aid records on.
TIP #4– ENABLE TWO-FACTOR AUTHENTICATION
For the uninitiated, two-factor authentication is a device that calls for a 2d code or validation to verify consumer login. It works very well in addition to the vintage transportable code generators utilized in safety doors and safes. Day-to-day means that whilst you log into your bills on a new tool, a code is either dispatched to your telephone or email to verify your identity. This method is a terrific security measure and one that can’t be overlooked – it forces your attacker to attempt to break into multiple devices/systems/accounts that are appreciably tougher to do than simply one.
TIP #5– BE CAREFUL WHERE YOU TYPE YOUR PERSONAL INFORMATION
Back onto social engineering for this one – I need to introduce you to phishing. Phishing is the social engineering technique that involves completely faking an internet site or form to make you trust it’s the original. For example, a phishing website of Facebook would possibly appear as a chunk like;
Credit: The Hacker News
Now, as you can see, the website itself looks exactly like Facebook. However, the URL isn’t even remotely close. Thankfully, this sort of phishing assault is being phased out, but it’s nonetheless one to look out for. Before getting into any banking/email/social media logins, be sure to test the address bar to make sure you’re at the proper website. You’ll also see an inexperienced padlock within the URL bar on trusted websites these days.
And that’s a wrap! In the name of Stay Smart Online Week and your personal net safety, please do not forget what you’re doing every day on the net. If you’ve got any safety-associated questions or want to determine if a certain email, textual content, or website is a scam, please feel free to email me: john@eftm.Com
John Abood
Studying Cyber Security and working for Macquarie Media Limited, John is a massive nerd with a passion for video games and computer systems. You will often find him in the streets advocating for the blessings of gaming or simply leading out.


