Category: General Safety

Why Your Boss Is Monitoring Your Internet Activity

Why Your Boss Is Monitoring Your Internet Activity

 

One of the most prominent employee monitoring surveys to date revealed that about two-thirds of U.S. companies – 66 percent – monitor their employees’ Internet use.

And that was 10 years ago.

The 2007 American Management Association (AMA) survey found that 45 percent of companies log keystrokes and 43 percent track employee emails. No major study has been released since, but tech and employment experts agree the numbers have increased. By some estimates, 80 percent of companies now monitor employee Internet use.

Typically, employers are looking for one or all of these:

  • Policy violations such as visiting inappropriate websites, using inappropriate language in emails, or spending company time on personal activities such as shopping or browsing social media
  • Evidence that you’re looking for another job, including job board and recruiting firm searches
  • Risky behavior – whether accidental or malicious – that could lead to a data breach, including emailing or printing confidential business information
  • Data and statistics on employee productivity

Only two states, Connecticut and Delaware, require companies to notify employees of monitoring, but most employers choose to be transparent. According to the AMA survey, 84 percent of companies that monitor computer activity let their employees know.

How Am I Being Monitored?

The vast majority of companies use employee monitoring software to automate this process. Even in 2007, nearly three-quarters of businesses that monitored emails used technology to do it, rather than assigning someone the task of manually reading emails.

Monitoring software is becoming so popular that the industry is exploding. What was a $200 million industry in 2016 is projected to reach $500 million by 2020, according to 451 Research.

Most monitoring software offers companies flexibility in what type of activity they monitor. They can set up custom flags or filters that send an alert when, for example, a specific topic is searched or a certain word is used in an email. Employers can also set up “rules” that track, flag and help prevent certain behavior, including visiting malware-infected websites or emailing sensitive records.

The tricky thing for employees is that it’s almost impossible to tell which activities your boss is monitoring. The company might be keeping tabs on only flagrant policy violations such as visiting an adult website, or they might be watching just about everything you do.

Can I Stop Employee Monitoring?

In a word, no. Employers have the legal right to monitor what takes place within their walls — and on company-issued devices. Employee contracts usually outline these rights. However, unless you agree to it, employers do not have the right to monitor your personal devices like smartphones, tablets and laptops, even if you sometimes use them for work purposes.

Keep in mind that there are important and legitimate reasons to monitor employee activity. Most of the time the purpose is simply to protect the business, not to snoop.

Employees cause more data breaches than hackers, sometimes purely by accident. According to a 2009 report from the American Management Association (AMA) and The ePolicy Institute, 14 percent of employees have emailed confidential information to a third party, while 6 percent have emailed credit card and Social Security information. Without monitoring tools, these undetected violations can cause major damage to a company’s reputation and finances.

How To Stay Under The Radar

About 30 percent of bosses have fired an employee for Internet misuse, the 2007 AMA study found. While 28 percent have fired a subordinate for email violations.

To avoid joining this statistic, never assuming anything you do at work or on a work-issued device is private. Assume you’re being monitored, even if you don’t know for sure. A simple rule of thumb: If you wouldn’t tell your boss about, don’t do it.

If you want to know whether you’re being monitored, ask. Most employers are willing to share this information. If they’re evasive, take that to mean yes.

About The Author

Why Your Boss is Monitoring Your Internet Activity

Isaac Kohen is the founder and CEO of Teramind, an employee monitoring and insider threat prevention platform that detects, records, and prevents, malicious user behavior. Isaac can be reached at ikohen@teramind.co. Twitter: @ITSecCentral @TeramindCo

How I Used A Reverse Number Lookup To Catch My Cheating Girlfriend

How I Used A Reverse Number Lookup To Catch My Cheating Girlfriend

 

I’m sure some of you out there have been in a relationship where someone has cheated. Maybe you were the one being cheated on, or perhaps you were the one doing the cheating. Personally, I have first hand experience with the former. Let me explain a little more about this relationship, and more importantly, how I was able to use Kiwi Searches phone lookup tool  to catch my girlfriend cheating.

Find Out Who They're Talking To

A few months ago, I ended a long-term relationship with a girl named Lisa. At first, everything started off as perfect as can be. We spent a few days talking online and texting each other before we decided to set up our first date. That was the beginning of a relationship that lasted just over two and a half years. For the majority of that time we were as happy as could be. We would go out together a few times a week, text each other constantly while we were apart and would spend just about all of our free time in each other’s company.

That being said, a few weeks after our two year anniversary, things started to go downhill. At first it started out slowly, with a break in our weekly routine. Little by little our time together started to disappear. While this was definitely a red flag, I didn’t think much of it at first. Lisa had told me that a new promotion at her job was responsible for taking up the majority of her free time. I remember her promising that once the training for said position was complete, we would get to see each other more often. At first, I was excited to hear about her promotion, but after a few weeks went by I began to realize the promotion wasn’t the reason for her lack of free time.

How I Used A Reverse Number Lookup To Catch My Cheating Girlfriend

What really convinced me something was wrong was the way she started behaving whenever we would spend time together. The first thing I noticed? She began hiding her phone from me constantly. At first I thought she was doing this unintentionally, after all, this was something she had never done before. Also, if her phone was ever left out in the open, it was always face down. But once again, I was willing to give her the benefit of the doubt.

That was until one day I noticed her phone constantly going off throughout the night. This began to bother me as it would continue to happen every time we saw each other. I never brought my concerns to her attention, but I did make a passing comment on all the new messages she was receiving. But she insisted these messages were from her job, and we left it at that.

After a few consecutive weeks of similar behavior, I decided it was time to take matters into my own hands. One evening, Lisa fell asleep on the couch in the middle of our movie night. However, out of the corner of my eye I noticed her face down phone had constantly been lighting up throughout the movie. I reached for the phone, careful not to wake Lisa up. What I found when I flipped over the phone shocked me. In the hour and a half that the movie was playing for, Lisa had received 7 missed calls from a seemingly random phone number along with 23 new text messages. I couldn’t believe what I was seeing. My first thought was to use Lisa’s finger to unlock her phone. That way I could at least read all those text messages, which were undoubtedly from the same number.

Half of me wanted so badly to unlock her phone. I needed to know who was sending my girlfriend these messages nonstop. But the other half of me still trusted Lisa. I asked myself what would happen if I broke into her phone only to find out the person on the other end had the wrong number? Also, I knew if I went through with this plan, Lisa would undoubtedly wake up and catch me in the act. Ultimately, I decided against breaking into her phone, but I couldn’t shake the feeling that this wasn’t a random caller.

The next day I did what anybody would do when faced with a problem they couldn’t solve: I asked Google. After typing in “how to reverse look up a phone number” I stumbled upon an amazing service that helped me identify that random number, and so much more.

Using A Reverse Phone Number Lookup Service

As I said earlier, the service that I used to perform this number lookup was called Kiwi Searches. Upon arriving on the homepage, the first thing I noticed was the amount of services available. From the reverse address lookup to criminal record searches, Kiwi Searches can be used to compile a variety of different reports. But I was here for one reason, which was to find out as much as possible about the owner of a particular phone number.

I began this process by selecting the reverse phone search option from the drop down menu on the homepage. After entering the number I discovered on Lisa’s phone the night before, I was brought to a preview page which revealed a few details about the phone’s owner. This information included the owner’s age and address history. To my surprise, this individual lived only a few miles from Lisa’s job and was around the same age as us. I needed to know more, so I decided to go ahead and purchase the full report. What I discovered next changed everything.

The information laid out in the phone report gave me the owner’s name: Brad. Having found this information, I decided to go back and perform a reverse name lookup on this Brad. From this report, I discovered that Brad not only lives close to Lisa’s job, he actually works there as well. But the most surprising thing I found was in the social media section of the report. It turns out Brad has a ton of recent pictures, including one of him kissing my girlfriend! This was all I needed to finally convince myself to end my relationship with Lisa.

I can honestly say that without Kiwi Searches, I might still be with Lisa today. So if you ever find yourself in a similar situation, the first thing you should do is gather as much information as possible. And the best way to do that is by using Kiwi Searches.

Why You Should Avoid Connected Toys This Holiday Season

Why You Should Avoid Connected Toys This Holiday Season

 

Thinking of giving a connected toy as a gift this holiday season? If so, you may want to reconsider that decision, at least for the time being. This year has seen some of the most widespread security breaches in recent memory. botnet attacks solely on IoT devices have been on the rise. And while botnets are quickly becoming more advanced, IoT device security has remained weak, if present at all.

The Dangers Of Wi-Fi Enabled Children’s Toys

Why You Should Avoid Connected Toys This Holiday Season
The arrival of Mattel’s Hello Barbie was met with harsh criticism over privacy concerns.

From blatant invasions of privacy to allowing strangers to talk directly to your child, connected toys present a new and ever present danger.

Take for instance Mattel’s Hello Barbie, which was released around this time a few years ago. The premiere feature of this doll is a push-to-talk microphone and speaker located on the doll’s necklace. Once activated, the child’s voice is sent to ToyTalk (Mattel’s partner on this project) where keywords are identified and an appropriate response is transmitted back to the doll. The issue with this? The entire conversation is kept on record to help “improve” the product in the future. In essence, the Hello Barbie doll is a surveillance device for Mattel. All of the information acquired by these dolls can be used as Mattel sees fit, including the right to sell this information off to third party companies.

The situation surrounding Hello Barbie depicts how a connected toy can be intentionally designed to exploit your child’s privacy. In fact, Germany has taken legislative action against a similar connected toy. As of this time last year, the connected toy My Friend Carla (which behaves in a similar way to Mattel’s Hello Barbie) has been designated as an “illegal espionage apparatus” by the German government. As a result, any German store found selling the My Friend Carla will be heavily fined.

Security Flaws In Connected Toys

In addition to privacy concerns, connected toys also suffer from lackluster security protocols. One potentially dangerous example of this is the I-Que Intelligent Robot. By itself, the I-Que Intelligent Robot is simply an action figure that lights up. However, once connected to a smartphone app, the toy essentially becomes an IoT device. This connection gives the robot a whole new set of actions, including games and text-to-speech activation.

But because of the devices lack of security, any individual with this app installed on their phone can easily access the toy. And since the app allows for text-to-speech, any stranger can communicate directly to your child without you knowing.

While its true that anyone attempting to access these connected toys would have to be within Wi-Fi or Blutooth range. These ranges can be extended, allowing an individual to easily search for unsecured devices from outside the house.

If your child already has a connected toy (even if it’s not one of the above) you should make sure they remain supervised while they play with it. That way, even if their particular toy has vulnerabilities, you can ensure your child remains safe.

Related Article: How To Protect Your Devices From The Latest WiFi Vulnerability

 

Critical Security Flaw Discovered In MacOS High Sierra

Critical Security Flaw Discovered In MacOS High Sierra

 

If you’re a regular here on Digital Security World, then you already know how much we stress the need for strong password protection. Even if this is your first time here, you probably know something about password security and its importance. That being said, what could possibly be worse for account security than having a weak password? How about having no password at all. Incredibly, this was the state of all Mac devices running the macOS High Sierra 10.13.1 software last week. This coming from one of the most prominent tech companies in the world, a company which prides itself on the security of its devices.

The following devices are compatible with MacOS High Sierra software:

  • iMac
  • MacBook
  • iMac Pro
  • Mac Pro
  • MacBook Pro
  • MacBook Air
  • Mac Mini
  • MacBook Retina

The High Sierra Vulnerability

Critical Security Flaw Discovered In MacOS High Sierra
The “root” vulnerability affects every Apple device running the macOS 10.13.1 High Sierra software.

First reported by developer Lemi Orhan Ergin, the vulnerability in the 10.13.1 version of High Sierra gives anyone access to the above devices without having to know the login information. Simply typing the word “root” into the username field while leaving the password field blank will award full access to the computer. Even worse, accessing the device in this way will grant the user administrator status. This is relevant because a user with administrator status can easily access any file or location on the computer, including areas that a standard user would not have access to. For example, if you happen to have your iPhone synced to your Mac or iCloud, an intruder could spy on your text messages.

While it’s easy to see the massive security risk associated with this particular vulnerability, Apple was able to put out a quick patch to address the issue (MacOS 10.13.2 High Sierra). Unfortunately, some users have noted an issue with updating from the base version of High Sierra (MacOS 10.13) to the latest update. So if you happened to skip the MacOS 10.13.1 update, just make sure you reapply the latest version and restart your computer afterward. This will fix the root vulnerability.

Were any of your devices affected by the root vulnerability? Have a question regarding High Sierra? If so, leave a comment below.

You May Also Like: Does The iPhone X Face ID Pose A Security Threat?

Protecting Your Google Home And Amazon Alexa

Protecting Your Google Home And Amazon Alexa

 

Do you have a voice assistant in your home? If so, you already know about the convenience these devices can give both you and your family. Whether its an Amazon Alexa in your living room, or a Google Assistant in your kitchen, these devices are great for helping you multitask. And if you happen to have the Google Assistant, it can do two things at once as well. On the other hand, if you purchased an Alexa instead, you can take advantage of the more than 20,000 “skills” available. For example, fans of the game Destiny 2 can use an Alexa skill to equip their favorite loadout or call for backup, all without having to pick up a controller. You can even purchase your very own Ghost (the AI companion that helps guide you through the game) which connects to your Alexa, giving you the most immersive gaming experience possible.

As with any device that’s connected to the Internet, security is of paramount concern. Voice assistants are no exception, which is why you must take the necessary steps in order to secure them. Aside from having access to personal information, voice assistants can also be used to make online purchases. Luckily, there are ways you can prevent unauthorized access to your information.

Voice Assistant Vulnerabilities

Not taking into account the more technical security issues, such as WiFi exploits that could compromise your devices, there are other ways for someone to gain access to your Alexa or Google Assistant. The simplest one? Imitating the owner’s voice. A key feature of voice assistants is their ability to differentiate one person’s voice from another. This allows the device to store personal settings (such as account information) for each individual user. The problem with this? It’s pretty easy to fool the voice recognition software.

Your Smart Home's Voice Recognition Software Could Be Easily Tricked
It’s far easier for someone to access your voice assistant than you may realize.

To be fair, if someone was trying to access your personal profile they would still have to be close enough to your device to activate it. That being said, if you’re someone who lives with a few roommates, your device may be at risk. Luckily, there are ways you can protect yourself.

Securing Your Google Home Or Alexa

The absolute best way to secure either of devices would be to completely disable the voice recognition tool. That way you won’t have to worry about someone getting into your own personal profile. For most users though, this defeats the purpose of having a voice assistant in the first place. Instead, try adding a voice activated pin number to your personal account, That way, anytime your Google Assistant or Alexa is prompted to make a purchase, the 4-digit pin number would have to be spoken first. While this is somewhat inconvenient, it does end up giving you the best of both words. You will still be able to make purchases via voice command, but you’ll also have the security you need to protect your personal information.

Related: How To Secure Your Connected Devices And Personal Information

Your Financial Security Is At Stake: Why Digital Funds Are Safer Than Cash

Your Financial Security Is At Stake: Why Digital Funds Are Safer Than Cash

 

Cash transactions are becoming more and more obsolete with time. An increasing number of retailers are beginning to accept digital payments like Apple Pay or credit cards with chip technology and are stocking their registers as minimally as possible. This is done for convenience as well as concern for health. CNN reported recently that there are 100+ different types of bacteria swarming all over the currency circulating New York City alone. Imagine how much more can be found throughout the state, country, or even world? It’s unsanitary and the reason food handlers have requirements for wearing and changing their gloves during cash transactions. 

Consumers realize this. It’s a major source of the switch from physical bills to digital payments. Of course, it’s also so much easier to carry your wallet around on your phone. For men and women alike, carrying around cash is bulky and irritating to deal with. Minimalism is the new trend, including reduction of personal items on your actual person. Especially for travelers, this is the safest way, since cash is easier to steal and makes you more of a target for thieves and scammers.

Digital funds have even taken over the personal transaction market, with apps like Venmo that allow you to instantly transfer money from your bank account or Venmo reserve to friends via only your mobile device. No need for cash, a credit card to upload funds, or even to meet in person. You can send money to someone that lives halfway around the world in an instant if you want or need to.

Your Financial Security Is At Stake: Why Digital Funds Are Safer Than Cash

Now, Venmo is expanding its reach by venturing into the retail environment. Soon, users everywhere will be able to use a Venmo debit card in their favorite stores. This practice will use your reserve of Venmo funds as if Venmo itself is your bank. This way, if a friend pays you through the app, instead of having to transfer the money back into your bank account or use it to pay someone else in the future, you can use your debit card to make a transaction directly from your account.

How else do digital transactions protect us?

When your funds are entirely digital, it’s not only easier to spend money, but it’s easier to keep track of your payments. There are apps to track your spending, like Mint or GoodBudget, as well as financial planning software you can download to your computer. They will even analyze the data for you to help you spend and budget most efficiently. Look around to find the best program for you. Check out reviews of Intuit Quickbooks, for example, before taking the plunge. Many of these softwares are for the business owner and individual alike.

Your Financial Security Is At Stake: Why Digital Funds Are Safer Than Cash

Although digital currency like Bitcoin has done extremely well in terms of its value over the past few years, it has yet to catch on as the popular mode of spending (although its use is widely accepted by online retailers and marketplaces). However, given the trend towards digitizing our purchasing power, there’s no doubt that we will see an entirely computerized world–money and all.

Digital wallets are the most effective method of spending while traveling, too, for safety purposes. If you’re interested in learning more about protecting yourself and your devices from theft while on vacation, check out our related post: 6 Safety Tips For The Tech-Savvy Traveler

6 Safety Tips For The Tech-Savvy Traveler

6 Safety Tips For The Tech-Savvy Traveler

 

Whether traveling for business or pleasure, you’re probably going to have to (or want to) bring your electronic devices along. Chances are, you only have one of each device and are worried about potentially losing it and all the data kept inside.

 

To ease your worries, follow these 6 safety tips for the tech-savvy traveler:

 

1. Use VPNs

Using a secure network like a VPN (Virtual Private Network) will keep your data and all internet traffic encrypted for your eyes only. It essentially hides your device’s true IP address so no one will be able to track or steal your personal information.

 

2. Security software

6 Safety Tips For The Tech-Savvy Traveler

There are programs you can download to your device that will protect it from all kinds of external threats, including a helpful wifi protection feature that determines if a network is safe for you to access. Since the average traveller uses mostly public networks at cafés, parks, and transportation hubs, this is a great way to ensure you are not entering a wifi trap that is run by a malicious hacker looking to steal your data. Read reviews of security software before purchasing to ensure it promotes this feature and any others that may be of assistance during (and after) your travels.

 

3. Back it up

When you take your devices with you to any location other than the safe nest of your home, you run the risk of theft. If that were to happen, would you have another copy of your precious data, files, photos, videos, and games? If the answer is no, you need to take action immediately. Look into a program like DDI utilities for your mobile device or read reviews of Acronis True Image for a data recovery program compatible with your PC or Mac.

 

4. Trackers

Any device these days has the ability to turn on the location services. By having this system enabled, coupled with a cell phone tracking app that will monitor the location of your device and even remotely access the camera should your phone be stolen or lost, you can easily retrieve your data and find out where the thief is hiding your device!

 

5. Loss protection and insurance

6 Safety Tips For The Tech-Savvy Traveler

One of the greatest assets a frequent traveler can obtain is travel insurance. These programs protect your wallet against cancellations, lost or stolen luggage and personal items, and even medical issues. Without it, you may find yourself stuck with a hefty bill and no way to pay it.

 

6. Take advantage of apps

There are several apps that can help you plan your travel and stay on track. Flight trackers, itinerary planners, and destination podcasts are just a few of the interesting features of the best travel apps out there. Use them to help you find quality coffee spots, interact with locals, and inform you of potential transportation delays.

 

The safest travelers are the smartest travelers. Keep your technology and all your data safe while you’re on the road, in the air, or underground by practicing these tips. You can thank us later.

 

For the traveling businessman’s guide to protecting company data, see our related post: 5 Strategies For Protecting Your Business Assets And Ideas From Fraud Or Theft

How To Use A Cell Phone To Keep Your Children Safe

How To Use A Cell Phone To Keep Your Children Safe

 

It’s nearly impossible to keep children safe and secure 100% of the time. There are times when they are going to have to be away from you at school, summer camp, or during a sleepover. You can’t control their every action, but you can monitor them remotely to verify they are making smart choices while out of your sight.

 

Here are 4 ways how to use a cell phone to keep your children safe:

 

1. Social media alerts

If your child has accounts on social media sites, it’s up to you to ensure they are behaving responsibly and not posting anything dangerous. To keep track of this without violating their privacy and logging in to their account, you can set up social media alerts. This means that any time your child posts something, you’ll receive a notification on your own account so you know to check and see what they shared. If it’s inappropriate, you can speak to your child about taking it down.

 

2. Parental controls

How To Use A Cell Phone To Keep Your Children Safe

When using your device, you can enable “kid mode” or “safety mode” as some developers call it, so your child can only access certain apps or games on your cell phone. However, this can also be an option if they have their own device or utilize streaming services like Netflix or Hulu. Call and speak to your service provider to find out if this option is available so you can make sure they are only using approved sites and applications.

 

3. Cell phone spy app

For the extremely concerned parent, a cell phone spy app like Highster Mobile or DDI Utilities will allow you to see every digital move your child makes. You can track their text messages, see what apps they used, view their photos, and more. If you think this is a viable option for you, check out some reviews on cell phone spy apps to find which product is best for your needs.

 

4. Check in

How to Use A Cell Phone To Keep Your Children Safe

The simplest and easiest way to monitor your child is by trusting them to do the right thing, but checking in on them when you’re concerned. Require that your child sends you a text message or a photo when they get to their destination. If you don’t know where they are, don’t stew in silence or wondergive them a call! Regular contact with your child is the most efficient way to build trust while monitoring their behavior.

 

As a parent, keeping your child safe is your #1 priority. It can be difficult to accomplish, but thankfully there are these available methods to help you along the way. If you follow these tips and encourage communication with your children, you are sure to be successful in keeping them as safe as possible.

 

If you’re interested in reading more about protecting you and your loved ones, read our related post: How To Safely Browse The Internet

 

5 Ways To Protect Yourself From Cyberstalkers

5 Ways To Protect Yourself From Cyberstalkers

Stalkers are not always simply hidden shadows in the night. The evolution of technology has made it easier for stalkers to achieve their menacing goals. It’s important to be informed about this issue in order to defend yourself against potential threats.

 

Here are 5 ways to protect yourself from cyberstalkers:

 

1. Hide your personal information

5 Ways To Protect Yourself From Cyberstalkers

Social media sites encourage you to share as much of your life as possible with your “friends.” It might be nice to be able to instantly look up someone’s birthday or check out where their new job is located, but just remember that everyone now has access to this information.

To best protect yourself, you should hide this information using your account’s privacy settings. The people that need to know that information can just ask you in person. It’s better to be safe than sorry.

 

2. Use security software

Security programs have a ton of features nowadays. Not only can they prevent your computer from getting a virus, but they can tell if a website is threatening, check your emails, and even monitor your children’s Internet usage to protect against malware, ransomware, and cyber bullying. Look at some antivirus software reviews to see the different options and decide which is appropriate for your needs.

 

3. Stay logged out

5 Ways To Protect Yourself From Cyberstalkers

It may be easiest to keep all your accounts logged in to your computer and cell phone for quick access. However, quick access for you also means quick access for attackers and cyber stalkers. Log out of your account when you’re done with it and always keep your passwords to yourself. Don’t share them with someone else or save them in a publicly accessible document.

 

4. Avoid catfishing scams

When you’re finally ready to meet up with the person of your dreams after talking for a few weeks on dating apps like Tinder or Sugardaddie.com, don’t throw all caution to the wind for love. Be smart. Don’t give out your personal contact and social media information unless the other person reciprocates. Also be sure to video chat with them via Skype or FaceTime before meeting in person to ensure they are who they claim to be and are not pulling a catfishing scam on you.

 

5. Never send sensitive information

5 Ways To Protect Yourself From Cyberstalkers

Your banking information and social security number are for your eyes only! If your bank needs access to your account or asks you to send them sensitive information, always confirm with their customer support service before giving it out. No matter how forgetful you are, no one else in your life (including your family members) should know what your debit card pin number is. Giving that information to anyone allows for it to be stolen by a cyberstalking third party who is spying on your every electronic move.

 

Cyberstalking is a real and serious crime that occurs every day to people around the world. Don’t let yourself be one of them. Stay vigilant, keep your personal information personal, and good luck out there.

 

 

Related post: 4 Safety Tips For Meeting People From An Online Dating Service

How To Safely Browse The Internet (INFOGRAPHIC)

How To Safely Browse The Internet (INFOGRAPHIC)

WannaCry ransomware, Google Docs phishing email scam, security breaches, fake calls… the list of recent digital threats goes on and on. With thousands of devices full of data already compromised, it’s important to discuss the precautions we can take on how to safely browse the internet — no matter if you use a phone, laptop, desktop, or tablet.

 

Here are 11 tips on how to safely browse the internet:

 

  1. Install antivirus, spyware, malware, and ransomware programs with browser plugins.
  2. Don’t visit any suspicious sites or click on any spammy ads.
  3. Shop online with only trusted websites (and never enter your personal or payment info into untrustworthy sites!).
  4. Check the top of your web browser to ensure the website you’re on is deemed SECURE with an https:// URL.
    ex. Example of a secure https:// URL
  5. Read up on popular scams of the week to be in-the-know of what to look out for.
  6. Make sure you’re always connected to a safe wifi network.
  7. Install a sturdy firewall.
  8. Download files and attachments from safe websites and familiar email addresses.
  9. Avoid unwanted tracking by regularly browsing in incognito mode and clearing your web browser’s cookies and cache.
  10. Be careful of opening or answering weird emails from unknown senders.

 

INFOGRAPHIC:

10 Tips On How To Safely Browse The Internet INFOGRAPHIC

 

Thanks for reading! Do you have any more tips on how to safely surf the web? Let us know in the comments below.

 

Related Post: 5 Types Of Digital Threats To Beware Of & How To Prevent Them