Technology has significantly changed our daily lives, but security systems are essential to ensure its proper use. Cybersecurity helps protect our information from digital attackers or hackers. You can compare this to your home: just as a janitor or guard protects your home from robbers, a cybersecurity system is needed to safeguard your computer or online information.
Sazit Suvo
Designer
Keep Software Updated
Regular Updates: Regularly update your software and operating system. This includes both your computer and mobile phone to protect against vulnerabilities.
Check Before Entering a Link
Link Verification: Carefully check links before accessing them. Use VirusTotal.com for link verification.
Use HTTPS: Always browse websites using HTTPS. Install the ‘HTTPS Everywhere’ tool to ensure all browser data is encrypted.
Enable Two-Factor Authentication (2FA)
Add an extra layer of security to your accounts by enabling 2FA.
Be Cautious with Emails
Avoid clicking on suspicious links or attachments.
Verify the sender’s authenticity before responding.
Use Secure Networks
Avoid using public Wi-Fi for sensitive transactions.
Consider using a VPN for encrypted communication.
Use Strong Passwords
Create complex passwords with a mix of letters, numbers, and symbols.
Avoid using easily guessable information.
Use a password manager to keep track of unique passwords.
Avoid Charging Phones in Public Places
Never charge your phone in public places, as it may be a hacker trap. Connecting your phone in such places can allow hackers to steal your data through the USB cable.
Understanding Cyber Security:
Cybersecurity is a means of protecting computers or digital networks from attacks. For instance, if a person Mr.X and his computer contains sensitive information like bank details and other projects, a lack of cybersecurity measures could lead to significant financial loss if someone else gains access to it.
A cyber attacker could input a small virus into Mr.X computer. Without proper security measures, Mr.X wouldn’t be aware of the virus. The attacker could then steal all of his information, disable his computer, and encrypt all necessary data.