Skip to main content

Protecting Yourself From Cybercriminals … a 5-Step Program


Guest Post by Kate Schneiders

Most homes in America have personal computers connected to cyberspace. The Internet was a great invention … it allows us to communicate with people and businesses across the glove, access educational information, connect with friends and contacts via social media, and even get information on medical issues. Although the Internet can be a great thing, it can also be a very dangerous place to hang out. It’s easy to fall victim to cyber-predators … which is why I’m sharing these 5 tips to help keep you and your kiddos safe in cyberspace.

1. Stay Current

Hackers use malicious software, called malware, to infect your computer and gain access to personal information. So, to help keep your system protected from their attacks, make sure that your antivirus software is up-to-date. With more than 100 new computer viruses being released into the wild every day, current antivirus software is crucial to your Internet safety. Also critical to your safety, is current anti-spam software and updated firewall settings.

2. Beware of Charity Scams

Scam artists love major disasters. With the recent earthquake and tsunami in Japan, thousands of people are heading to the Internet to see what they can do to help the victims. And, you can bet cybercriminals and other hackers are eager to take advantage of people’s charity for their own gain. So, if you are considering donating to relief efforts, make sure to research the charity before you give them your personal information. Make sure that you are donating to legitimate charities (this charity research tool by the BBB is a great resource.)

Note: Avoid e-mail solicitations for charity money because most of them are scams. If you are contacted by a fraudulent ‘charity’, make sure you report it to the Internet Crime Complaint Center, BBB or National Center for Disaster Relief.

3. Social Network Safety

Facebook and Twitter are the place to be in cyberspace. I like to think of them as the cyberspace version of the smokin’ hot student body president football star (or for you men out there, the drop-dead gorgeous cheerleading homecoming queen) that you gushed over your sophomore year in high school.

Because so many people are using social networking sites, it’s more important now than ever before to make sure that you are aware of who can access your profile and search for you. Customize the ‘Settings’ or ‘Options’ to block people from searching from you and control who can see what you post. Be smart and don’t post things that you would only tell a close friend. Remember, this is the Internet we are talking about … nothing is really private. Also, make sure that if you use your mobile phone for social networking that no one can gain access to it from your profile. (If you use Facebook and haven’t checked it out lately, you may want to remove your mobile number from the new ‘phonebook’ app they’ve created.

4. Think Before You Click

Before you start opening attachments or clicking on e-mail links, make sure you take a minute to think about what you are doing. Be wary of clicking links or buttons in popup windows. Check out the website you are visiting and make sure that it’s secure. Sites with addresses that begin with https (‘s’ for secure) with a padlock are safe. However, even if it’s safe, don’t just start handing out your personal information. It’s best to share as little personal information online as possible. Before you share your personal information, make sure the recipient (site or individual) is trustworthy. And, if in doubt, it’s best to error on the side of being overly cautious.

5. Secure Passwords

Make sure that you are using strong passwords that are secure. Passwords are like toothbrushes – you shouldn't share them with others and you should get a new one regularly. Don't know how to create a secure password? Microsoft has a page with great tips to help you create strong passwords that you can remember. The best passwords use both upper and lower case letters, numbers and some symbols. Don't use the same password for every log in. Make sure important accounts (like banking or credit cards) have their own secure password. Also, you may want to consider password protecting your wireless Internet connection at home so that people can't hack your network and gain access to your computer.


So, there you have it. Five tips to help you stay safe online. You don't have to be a security expert to keep your computer safe, just try to become web savvy. Take time to research Internet trends, talk with other parents and computer users or read articles about security.

If you want more information about how you can keep your children and computer safe in cyberspace, check out this Parent’s Guide to Internet Safety created by the FBI. It’s got a lot of really great information.

Kate Schneiders is a real technogeek and a self-proclaimed ‘word nerd.’ She has been contributing to blogs and the Internet in general for the past 5 years. In her spare time you can find her crafting, cooking and teaching her technotard husband about antivirus software.

Comments

Popular posts from this blog

Best Free Project Management Software

Businesses in today's day and age seem to be faced with various problems, such as escalating expenses, overdue deadlines, and improper delegations of tasks, to name a few. Because of this, it would be of the utmost essence for companies to choose the perfect project management software for their business. Fortunately, there are many options in today's market that can satisfy practically any demand a business might have, regardless of how big or small it might be. Here are some of the best offerings in project management software today: 1. Asana Asana focuses mostly on improving a team's workflow. One advantage that this service has over the rest is that smaller teams can use it completely free of charge. Also, aside from all of the basic features that project management tools tend to have, Asana developers have made it possible for users to get task notifications directly in their email inboxes. Plus, Asana can be used on most tablets and mobile phones. In fact, it eve...

Touch Screen Games for Windows 7

The touch screen system is a great system that can make life a lot easier. It can also bridge the gap between laptop or PC and the tablet. The

How mobile monitoring apps are changing the spy world?

Parents always expect the best out of their children, and so does the employers from their employees. For instance, parents buy their kids a smartphone, and expect them to do well in their academics. Similarly, an employer issues smartphones to their employees to ensure that they excel at work, and contribute towards maximizing profits in the business. However, when expectations are not met, or if you sense that there is something inappropriate concerned to their activities or behavior, then the need to monitor their cell phones arises. In addition, if you suspect that your spouse is giving your share of time and attention to another person, you are certainly left with no option but to monitor their activities. Role of Mobile Monitoring Apps The best method to monitor on someone is through mobile monitoring applications. These apps make your task of monitoring simpler like never before. The application fulfills the spying requirements of distinct individuals accurately. It not o...

Best iPad games: see what others are playing

If you’re looking to have some mega-fun on your iPad, then you need to look for the kinds of games that have gained massive popularity. Their

Best way to manage all data of the computer

Data management in computers There is no denying the fact that data management has its own working importance for a common person and also to an analyst. It depends a lot on your managing skills and the level of interest in different data types. Most of the people and computer owners like to divide the data into several folders files or drives so that they can easily access the required one on very less time. Management of data in computers basically refers to arrange the data of same type in different locations in the system. It can be easily grasped into the memory and moreover, you will be tension free. Disc utilization also gets efficient and more organized. Some top benefits of mastering the art of computer data management The biggest merit of managing data is the easy and quick accessibility of the required file or folder in need. You will not waste your precious time and efforts on searching for the correct file. When you manage your data in computer, it defin...

The Emerging Revolution in Game Theory

Prison’s Dilemma has been around for quite some time. Everyone had thought that they had figured out the strategy.

A Roundup of Must Have Google Resources

This is a guest post by Crystal J. Briscoe . Google have several resources available that helps those people who own their website. These resources help you in the success of the business. The Google resources could be accessed easily if you have a Google account. Once signing with the Goggle account the user would be able to use the various resources available online. 1. Resources available for free: As Google wants the people to use its resources hence these are offered free of cost. The user could enjoy their services based on the requirements. As most people uses Yahoo for email service, hence Google offered the users to sign in with a single user id and gain access to its various recourses. 2. Various Google Resources: In order to make use of the Google resources one must have the Gmail account that would help in utilizing there resources. You Gmail account would help in using different resources available easily. Just logging with your Gmail account and you will be a...

Two of The Best Parodied Mac Commercials of All Time

They say you’ll be able to measure your fame when people start imitating you or making a fool out of you. Let’s take Justin Bieber for example. Bieber, a Canadian teen star made famous by Usher and YouTube, has been mocked and targeted by Internet critics and bloggers all over the world. He’s been victimized everywhere, from YouTube (where millions of parody videos of his music videos are uploaded and viewed every day), to television (with shows like South Park and Saturday Night Live among others), to online blogs and forum sites (where you can find thousands of posters and photos about him). Everyone has something bad to say about Justin Bieber and I’d rather be selling laptops online than counting off all the “Bieber is gay” posters on Google images. But despite all the mockery, Bieber even takes the time to thank everyone for making him more famous by saying: “So I wake up today to almost 15 million on Facebook, over a billion views on YouTube and 6 million of the greatest fans o...

Asus Eee Pad Transformer Prime: World’s First Supercomputer Tablet

This is a guest post by Alia Haley . In this post, we will talk about Asus Eee Pad Transformer Prime, a tablet based on Android operating system. This is the successor of Eee Pad Transformer tablet PC and world’s first tablet with ARM Cortex A9 processor (Nvidia Tegra 3 Quad Core CPU). With use of this processor, this will be the most powerful consumer tablet and ultimate consumption device on the planet. Performance, gaming experience, graphics everything will be maximized still with a battery backup of 12 hours with a 22 WH battery. Are you excited? Read on to know more. Apart from a star processor, Asus is throwing many other extra goodies to make sure you buy the new Transformer Prime. Starting with the looks, the design is reworked with finish that is more metallic, thickness has gone down to 8.3 mm and the weight decreases to 586 grams. If we talk about the original Transformer, the thickness was 12.9 mm with a weight of 690 grams. The metallic finish makes the tablet more dur...

Finding Home and Wireless Internet Providers by Zip Code

This is a guest post by Blake Sanders about finding Home and Wireless Internet Providers by Zip Code. Many people assume that they need to use a specific local provider to get high speed internet, as certain providers often market themselves very heavily. However, internet coverage options vary greatly from one coverage area to the next. Due to a number of state and local laws, there are usually only one or two cable companies offering high speed internet, but there are no such restrictions on satellite companies. Even if you live in a small town, there's a fairly good chance that there are a few internet providers offering service for your address. In order to find fast internet speed at a low price, it's important to compare internet providers by zip code. Comparison Shop The old ways of finding a good service provider are gone. The fastest way to find one today is by using an online comparison website, as this will allow you to quickly look at prices, download spee...