News by Xiaomi Miui Hellas
Home » All the news » News » Press release » The 10 bad habits you need to get rid of in 2022 to protect your digital world
Press release

The 10 bad habits you need to get rid of in 2022 to protect your digital world

eset-logo

If you insist on not protecting your digital world, consider this: One-third of people who have been the victims of identity theft in the United States have said they did not have enough money to buy food or pay bills last year because they fell victim to fraud.


Τ2021 was one of the most "productive" years for cybercriminals. Monly the first half of 2021, were exposed almost 19 billion files.

If, however, you still do not want to find new ways to protect your digital world, consider this: one third of people who fell victim to identity theft in the US claimed he did not have enough money to buy food or pay bills last year because he fell victim to fraud. This according to data from US Identity Theft Resource Center.

For 2022, the experts of the global cybersecurity company ESET urge us to be vigilant, to be proactive and to change these 10 bad habits to improve our cyber-hygiene in the new year:

1. Use public Wi-Fi networks

We all go out and move a little more these days. And that brings with it the temptation to use public networks Wi-Fi. But there are dangers. Hackers can use the same networks to track your routes to Internet, access your accounts, and steal your information. To stay safe, try to avoid public ones altogether hotspots. If you must use them, do not connect to important accounts while connected to public networks.


2. Do you use weak passwords?

Passwords are the keys to our digital door. Unfortunately, as we have so many codes to remember nowadays - about 100 on average - we tend to we use them without thinking about safety. Using the same password for multiple accounts and using easy passwords give hackers a huge advantage. They have software to crack weak encryption, try frequently used password variations, and try to use compromised passwords on other accounts. You can use one password manager to remember and use strong, unique passwords or passphrases. Additionally, you can enable it two-factor authentication (2FA) in each account that offers it.

3. Think before you click!

The electronic fishing - Phishing is one of the most widespread threats in cyberspace. It uses a technique known as social engineering, where the attacker tries to trick the victim into clicking on a malicious link or opening a malicious attachment. They take advantage of our innate confidence and often try to force us to make a decision very quickly, giving the message a sense of urgency. The number one rule for preventing these attacks is to think before you click. Double check the person or company sending the email to make sure it is legitimate. Take a breath. Do not make hasty moves.

4. Do not use security programs on all devices?

It goes without saying that at a time when cyber threats are on the rise, you need to have someone installed malware protection program from a reputable company on all your computers and laptops. But how many of us enhance security on mobile devices and tablets us; According to researches, we pass almost 5.000 hours every year using these devices. And there are many opportunities to come across malicious applications and malware website at this time. Protect your device today.

5. You visit unsafe websites

The website in front of the indication https: // use encryption to protect traffic from your browser to the webpage. Https has two purposes: to certify that this website is genuine and not a product of phishing or fraud, and ensures that cybercriminals can not eavesdrop on your communications to steal passwords and financial information. Is not 100% guarantee that nothing bad will happen, as even today Phishing websites use the https. But it is a good start. Always look for the padlock symbol.

6. Do you connect work with personal life?

Many of us have spent much of the last two years blurring the line between work and personal life. As the line has become blurred, cyber threat has infiltrated. Many times we use his address Email and job passwords to sign up for shopping websites and more website. What if these are violated website; Hackers may be able to break into your account at work. The use of unprotected personal devices for business purposes also adds extra risk. It's worth the extra effort and to separate processes between work and leisure.

7. How? Do you provide detailed personal information over the phone?

Just like Phishing via Email and SMS, this method uses social engineering techniques to trick users into clicking, and so on The Phishing by telephone, called vishing, is an increasingly popular way for scammers to extract personal and financial information from victims. Scammers often camouflage their real numbers to legitimize the attack. The best rule is to do not give sensitive information over the phone. Ask who they are and where they are calling from, and then call the company directly to check - not using phone numbers provided by the caller.


8. Do not backup

The ransomware (Ransom ransom) costs businesses hundreds of millions a year. But there are variations ransomware which also threaten consumers. Imagine being locked out of your home computer. All the data in it, and possibly the files you saved in cloud, such as family photos and important documents could be lost forever. THE make regular backups, according to the rule best practice 3-2-1, provide peace of mind in case the worst happens.

9. Do not you protect the smart home?

Almost it a third of European homes Have smart devices, such as voice assistants, smart TVs and security cameras. Nevertheless, these devices are one attractive target for criminals. They can be violated and turned into botnet to launch attacks on others, or to be used as a gateway to other devices and your data. To keep them safe, change the default passwords at startup. Also, make sure to Choose a vendor that has a history of fixing known vulnerabilities in its products and investigate possible security vulnerabilities before purchasing one gadgets.

10. Do you use non-updated software?

One of the main ways in which cybercriminals can attack your computers and devices is the vulnerabilities operating systems, browsers, and software. In 2020, more vulnerabilities were identified than in any other year: over 18.100. That equates to more than 50 new software vulnerabilities per day! The good news is that you can turn it on mode automatic update and click on the update when prompted, so this job does not have to take up much of your time each day.

We all look forward to seeing what 2022 holds in store for us. Make sure it is a year full of only good surprises, improving your personal cyber security today


Mi TeamDo not forget to follow it Xiaomi-miui.gr on Google News to be informed immediately about all our new articles! You can also if you use RSS reader, add our page to your list by simply following this link >> https://news.xiaomi-miui.gr/feed/gn

 

Follow us on Telegram so that you are the first to learn our every news!

 

Read also

Leave a comment

* By using this form you agree to the storage and distribution of your messages on our page.

This site uses Akismet to reduce spam comments. Find out how your feedback data is processed.

Leave a Review

Xiaomi Miui Hellas
The official community of Xiaomi and MIUI in Greece.
Read also
Exemption from mobile and prepaid telephony charges can be from today…