Visit secure sites

URLs beginning with ‘https://’ (not http://) are using a combination of Hypertext Transfer Protocol (http://) with the Secure Socket Layer (SSL)/Transport Layer Security (TLS) protocol.

Your session is thus encrypted and cannot be intercepted but someone who wants to steal information.

Make sure that only you know the answers to the security questions

Security questions are useful when we forget our passwords and need to reset them. In fact, when signing up for email accounts, most of us unthinkingly put in truthful answers to easy

Have you ever stopped to think about how easy it is for bad guys to find the answers to questions like, “What is your mother’s maiden name?” or “What’s the name of the town in which you were born? It’s so easy to get information like this from any of your social media accounts these days.

Make sure you mix your answers with a combination of letters and numbers that only you will remember.

Tip: Don’t do what this guy did.

Use different passwords for different accounts

It’s easy to remember one password and use it for all of your accounts. If, however, one service gets hacked you might have quite a big problem on hand. So always take that into account.

You can make use of password services like LastPass to help you keep track of your list of passwords.

Try and make use of a 2-step verification process whenever it is offered for any service you sign up for.

Keep your OS and system updated

Operating systems like Windows and Mac regularly send updates notification for users. You should be updating as soon as you’re able to so you are protected against the latest security vulnerabilities.

For your antivirus software, email, apps and internet browsers you could make use of the automatic update feature provided so you’re always up to date.

Watch out for public WiFi

Fact: When you’re enjoying a cup of coffee at you local barista and access the internet to browse websites and update your social media status, you’re at risk of having someone intercept your connection & data.

A good practice is to turn off file sharing on your computer when you access the public Wifi.

Be mindful of your posts on social media

Sharing a status, your location or favourite spot to visit on social media is gold for hackers and criminals.

Also, before just accepting random people as friends on your social media accounts be mindful of the information they’ll gain access to about your family, friends, where you live and what you like to do.

Delete suspicious emails & their attachments

Those unsolicited emails you receive are meant to be deleted. If you receive something from a friend that also looks weird, check in with them first to make sure it comes from them and they are aware of what it is.

Their account could be hacked as a result of a hacker getting access via malware that was implemented or opened.

Know what you plug into your computer

If you use USB sticks, external hard drives or even smartphones you are not immune from malware. An example of this would be the BadUSB malware.

Before you plug anything into your computer, make sure that you know exactly where it came from, where it has been used before.

Try to make use of the cloud for file sharing.

Keep track of your devices

What if you lose any of your devices, even if it has the latest security features, antivirus programs and is up to date? Losing you device could mean losing all your images, files, photos or emails and other personal information.

Use a password protect for your lock screen and back up your data regularly. You could also turn on your device location software or use a third-party anti-theft app.

Use a secure site when downloading apps

Only download apps from 100% trusted sources — Apple app store, Android app store or from the original creator. Also, make sure that you are aware of the permissions you allow on each app.

You can also set up your downloads so that anything you download has to be opened manually instead of automatically. This is an additional step to ensure you stay in control of what programs are opened and installed on your device.

At the end of the day, your best defense is just using some good old fashioned common sense. If you’re unsure of anything and it looks fishy you are more than welcome to contact us with your questions and concerns.