Five Simple Tips for Better Cybersecurity
By | October 23, 2023 | New York Times
With the ever-increasing threat of hacking attempts and data breaches, safeguarding our information online has become an essential task. In light of Cybersecurity Awareness Month, Hazem Said, head of the University of Cincinnati’s School of Information Technology and co-director of the Ohio Cyber Range Institute, has shared five simple yet effective tips for better cybersecurity.
Use Strong Passwords and a Password Manager
One of the most fundamental steps to protect yourself online is to use strong, unique passwords. While simple passwords are easy to remember, they are also easier to guess or crack. To enhance security, passwords should be complex, longer, and include a combination of uppercase and lowercase letters, numbers, and special characters. It is crucial not to reuse passwords across multiple accounts, as it limits the potential damage if a password is compromised.
To keep track of all your complex passwords, consider using a password manager. Many phones, computers, and web browsers offer built-in password managers, or you can opt for third-party options. These tools securely store your passwords, ensuring convenience without compromising security.
Turn on Multi-Factor Authentication
Even with a strong password, adding an extra layer of security through multi-factor authentication (MFA) is wise. MFA requires additional information, such as a security code sent to your phone or email, to gain access to your accounts. By enabling MFA, even if your password is compromised, hackers would still need the additional verification to breach your accounts.
Hazem Said emphasizes the importance of securing our digital lives, comparing it to locking our homes and cars. He urges users to explore the various MFA methods available and choose the most convenient yet secure option for their preferences and trusted devices.
Recognize and Report Phishing
Phishing attempts have become increasingly sophisticated, making it vital for users to adopt a cautious approach. Phishing occurs when scammers send fraudulent emails, phone calls, or text messages to deceive individuals into revealing personal information, such as passwords or credit card details.
Some signs of phishing attempts include urgent or threatening language, requests for sensitive information, too good to be true offers, suspicious sender email addresses, unsolicited information, and spelling or grammatical errors. To combat phishing, Hazem Said advises users to pause and carefully assess each email received, avoiding opening messages that were not requested. When in doubt, it is best to assume it is a phishing attempt rather than giving the benefit of the doubt.
Email programs often offer options to report junk or phishing emails. Users can also forward suspicious emails to their employer’s information security staff or block the senders to help combat these scams.
Update Software Regularly
Software and app developers continually release updates to improve security, fix bugs, and add new features. Updating your devices’ software regularly is a simple yet effective way to minimize the risk of hackers gaining unauthorized access to your personal information.
Hazem Said emphasizes the importance of not delaying software updates, especially when they are security-related. Setting up automatic updates for software and apps is highly recommended. While feature updates can sometimes be delayed, security updates should be installed as soon as possible to ensure optimal protection.
Be Mindful of Where You Share Your Information
Another crucial step in protecting your information is to exercise caution when sharing it, particularly financial and sensitive data. Limiting the number of platforms and organizations with access to your information can significantly reduce the likelihood of it being compromised.
Hazem Said reminds individuals to be mindful of the digitally interconnected world we live in and to enjoy it with caution. Before sharing any personal information, it is essential to ensure the organization requesting it is reputable and trustworthy.
By following these five simple tips, users can enhance their cybersecurity and minimize the risks associated with online threats. In a world where our lives are becoming increasingly digital, it is imperative to prioritize the protection of our personal information.