How To's

Here are Some Cyber Hygiene Tips for your Spring Cleaning Exercise

It is just about that time of the year when people undertake various spring cleaning exercise. You know change oil in your car, wax the car paint, redo the house painting, fix some lose screws around the house, mow the lawn, this list could go on and on.

However, when it comes to spring cleaning few people ever think of reevaluating their online presence. Ironically, most things nowadays are done over the internet; we shop online, make friends online, do our banking online, tell our secrets online, and there are telltale evidence of our infidelity online. This list could also go on and on.

At this point, it should be clear that your peace of mind could be totally ruined if a hacker decided to take a swing at you. So do some spring cleaning also on your online presence.

Some basic Spring Cleaning for a good Cyber Hygiene

Check on Passwords strength

Rule of thumb, never use guessable passwords like your middle name, kids’ name, spouse’s name, birthday or anything of the sort. Diligent hackers troll your social media activities to come up with possible passwords based on your connections on Facebook or Twitter.

To be on the safe side, always use long and complicated passwords – a random combination of letters, numbers and characters – makes it very hard for hackers to guess the right password.

The longer you use the same password, the higher the chances it will fall into the wrong hands, or a hacker might have figured it out. It is better to change your password after some few months. When you change your password, be sure not to repeat an old password.

Never use the same p

assword for multiple sites, if someone gets access to your password. The damage could be widespread. Whenever possible, always opt for the multi-factor authentication; where after entering your password, a code is either texted to your phone or sent to your email. This provides an extra layer of security.

Always update your Software

Software are never perfect in as far as privacy and security is concerned, and developers are continually checking for these flaws and bugs. Whenever they find a vulnerability (which they often do), they send out updates to users.

As a user, you are obliged to keep all your software updated; the sooner, the better. Even when you are using a new iPhone or a new computer, the software might be outdated. You should always be proactive in checking for new updates before using a particular software.

Another thing most users forget to update is their routers and the assortments of ‘Internet of Things’ devices like the smart TVs. Some of these devices automatically update themselves, but you should not rely on that. Be proactive in checking that they are running the latest software from their manufacturer’s websites.

Perform Systems and Data Backup

Hackers are increasingly using ransomware to lock up users’ computers and threatened to wipe clean your hard disk if you don’t pay them. Such attacks are often the result of users unknowingly clicking on links sent in phishing emails or fake ads online.

When you are locked out of your computer, there is very little you can do other than pay up the ransom or write off you data. Sometimes, that second option is not an option, so you end up paying the high ransoms.

Had you backed up your data, you could easily write off the data on your hard disk and format it and install a new operating system. Then from your backed up data, you should be back to where you were before the ransomware attack.

You can set up an automatic system for backing up your data, on Windows PCs, say Windows 10. Under the ‘Update & Security’ section in ‘Settings,’ you can instruct the Windows to back up your files to an external hard disk. Once the backup is successful, ensure you unplug it from your computer; don’t leave it connected to the computer unnecessarily, as the ransomware could also creep into your hard disk.

On Mac OS X, you get ‘Time Machine’ for automatic backups. Earlier Windows versions also have built-in backup systems.

Be Careful on what you Share on Social Media

As much as you have the option of locking down your social media posts to just a few select groups of ‘friends.’ Always assume that the entire world is scrutinizing what you are posting with the intention of finding fault they can use against you. So never share too much of personal things or things that can be used to indict you.

Like mentioned above, hacker troll social media accounts to guess their way into figuring your actual passwords. Don’t also forget that employers are increasingly checking out social media activities of the people applying for jobs at their companies. So don’t let that carefree posts you make while drunk deny you that good job at that reputable company.

The above are some of the very basic spring cleaning exercises you should undertake to ensure you are in good shape as far as cyber hygiene is concerned.

Felix Omondi

Kenyan citizen with a passion for writing for as long as I can remember. In my spare time, I like to blog and read up on trends that's happening around the world.

Recent Posts

Specs on the God-Mode MacBook Pro 16′ and14′ unveiled at Yesterday’s #AppleEvent

With all the COVID pandemic disruptions on our regular lives, the year - like last…

7 hours ago

Technology in Dating: How Technological Progress can Affect the Dating Industry

Online dating has come a long way in a relatively short period. When dating sites…

10 hours ago

Want To Change The World? Check Out Our Top-Ranking Business Loans for Startups

If you read the stories behind some of the largest companies today, you’ll find a…

10 hours ago

The Top 10 Best Development Platforms for Low or No Code In 2021

Mobile app development is the latest trend that businesses around the world are following. Most…

10 hours ago

5 Pointers for a Successful Azure Penetration Test

Microsoft Azure, a popular cloud service used by businesses for their products and services, has…

1 day ago

Student Data Privacy – 9 Things You Should Implement

In the Internet age, teachers are increasingly using technical tools and applications to engage and…

1 day ago