The term “Cyber Hygiene” became recently visible among professionals dealing with information security. Speaking of cyber hygiene, first of all, we mean observing the elementary principles of digital security on the Internet, which has become an integral part of our life. We can draw a parallel with the rules of personal hygiene known to us. This means that we need to perceive the elementary rules of cyber hygiene at the level of everyday habits.
In the situation of rapid information transfer to digital form, it is extremely important to observe the set of cybersecurity rules. This is the basis of our security in the world of information technologies
What happens in practice?
- Three-quarters of users know that they must constantly follow the rules of cybersecurity, but still distribute their passwords.
- More than a third have at least one unprotected device, vulnerable to scams.
- Most believe that public Wi-Fi networks are convenient for checking e-mail, sending documents and logging into accounts and are willing to be at risk for the sake of free Internet.
These data eloquently tell us that it is one thing to know the rules and quite another to observe them.
Key tips for improving cybersecurity:
- Do not turn off your antivirus;
- Create and use complex passwords;
- Do not repeat them on all resources used. Hideez Key will store your credentials securely and keep them physically separated from your main device. Hideez Safe also provides automated password input scripts for most major sites and mobile applications. No additional plug-ins or setup are required;
- Use two-factor authentication wherever possible. You could use built-in OTP Generator of Hideez Key to generate one-time passwords for two-factor authentication to secure your data;
- Use the encryption of information on hard disks, USB-media and use encryption for the confidentiality of correspondence on the Internet.
But is it enough in the digital world to limit cyber hygiene exclusively as personal prevention?
Today, our security in the information space is no longer the need of a separate group, this is the need of every citizen. And non-compliance with cybersecurity rules, even in a minimal amount, can lead to total “infection” of the information space, to the violation of personal stability and the digital stability of the state.
In conditions where social networks have become an integral part of a person’s life and “identity theft” becomes a global problem, one must treat the preservation of one’s own information as material values.
Cyber Hygiene in Social Networks
Today, social networks are becoming more popular, every day new users are registered in such networks as Facebook, Instagram, Twitter, and others. In social networks, people can communicate, share photos and videos. And the more popular these resources are, the more interest the fraudsters show to them, and the more dangerous it becomes to use them. In order not to run into hackers, spammers and scammers who steal personal data, you need to know the rules of safety in social networks.
- When registering with a social network, it is better to think up a random password consisting of at least 6-7 characters. The password from your account on the social network and the password from the e-mail should not coincide, this will make it difficult for hackers. And if the passwords are different, then you can send a password to your email from your account. Best of all, if for each site on the network you will have different passwords.
- To access social networks, use only common and proven browsers. Do not forget to also install updates for your operating system, browsers, firewall and for antivirus – all these precautions will help you to increase your level of security in social networks.
- Never accept or install unknown files from people you do not know. Do not open suspicious messages that contain links to unknown resources, and never click on these links. Scammers can promise you anything, including pictures of naked celebrities, do not take their bait.
- Do not install applications for social networks that supposedly allow you to find work, download music, videos and more if you are not sure about the security of these applications. Often during installation, they ask for login and password from your account – all these are the tricks of hackers who are trying to get access to your account.
- Try not to access your accounts on social networks from other people’s computers. Even if you trust this person, it can happen that there is a Trojan on his computer that will send the data to your hacker about your account.
- Carefully place information about yourself in social networks. Often scammers hack into accounts using the button “Forgot your password?”, Which offers to answer a secret question.These questions are standard, and the user can answer them by carelessness on his page. Therefore, if the social network allows, it is better to come up with your own, original secret question.
- Sometimes messages sent to you supposedly by your friends can be sent by intruders who hacked their accounts. Therefore, if the message seems suspicious or contains a suspicious link, contact your friend directly or by phone to make sure that the message has actually come from him.
- Do not allow social networks to scan your e-mail address book so that they do not disclose their friends’ addresses.
- To enter the social network, use the browser’s address bar directly or a bookmark. If you go to a social network via a random link from the Internet, you can go to a fake site that steals personal information.
- Watch who you add to your friends. Often scammers try to find out information that is only available to your friends.
- Try not to use social networks in your workplace. A social network can become a source of viruses or spyware that can corrupt office equipment or lead to loss of information that constitutes a trade secret of your company.
So, we have considered the main rules of security in social networks. Follow these simple rules and everything will be in order.
To summarize, we return to the beginning. Is it sufficient to understand the cyber hygiene only as the observance of human security measures in the information environment? It turns out that no. The concept of cyber hygiene is much broader and includes the study of the effect on digitalization of human beings, the development of norms and measures both for the information protection of a person and for the improvement of the information environment. And, of course, the promotion of knowledge of the fundamentals of cybersecurity behavior.
We are sure that the expansion of the concept of “cyber hygiene” will seriously increase the level of involvement of citizens and the state in issues of cybersecurity. Increasing its culture at the level of each citizen, creating a proactive cybersecurity service at the company level and, of course, the full inclusion of the state in the issue of creating cybersecurity as an ecosystem. That’s the way to go. It is long and complicated, but we all know that the most difficult is to start.