protection virus informatique

How to effectively protect your connected devices?

For several years, it has been impossible for us to do without our connected devices. Smartphones, laptops, tablets and even smartwatches are now an integral part of our daily lives, and for the geeks that we are, it is difficult to imagine doing without them.

It must also be said that the ease with which it is possible to order a cinema ticket from your smartphone or even place an order in a few minutes for a meal or a new computer does not help us to ignore these new technologies !

The importance of an Internet connection

All our connected devices and digital products are connected to the Internet, even our televisions are now! This “all connected” mode allows us to receive content of all types and access numerous information from the web.

The Internet guarantees us access to hundreds, if not thousands, of online services necessary to live more easily in an almost entirely digitalized world. It is not for nothing that UNESCO plans to protect access to the Internet as a universal right and world heritage.

But who says connection with the whole world, inevitably says exposure to cyber threats. Access to the network of networks is a double-edged sword, and the other side of the coin is that there is a risk of seeing your personal data exposed in broad daylight if no security of your data is put in place.


Since the creation of the first computers for the general public, viruses have followed fairly quickly to harm people and their interests. It is human nature to hate others, without it being justified.

There are different computer threats in the digital world, such as viruses that attack our computers in order to corrupt crucial files of the system and make it unusable. Spyware, Malware or even Rasomware are very widespread these days and this requires us, for our security, to use specialized software to protect ourselves from them.

How to better protect our connected devices

Within the same household, it is rare to have only one connected device. This is why we have put together a short guide for you which, we hope, will help you to secure its daily use.

  • Use an antivirus for your PC / Mac. The easiest way to protect a computer is to use an antivirus. There are many on the market, and apart from some of them (more generally free antiviruses), the vast majority of them are capable of offering effective protection for everyday use. A little research on the Internet will help you explore the opinions of users and specialist magazines. Because yes, the ranking changes regularly due in particular to the regular updates offered by the publishers of this software. If you would like to take a quick look at the most efficient and reputable software in this area, here you will find a list of antiviruses that we consider reliable and which will effectively protect you against daily web threats.
  • Be careful with contact payments. Almost all smartphones are equipped with NFC (Near Field Communication) chips that allow data transfer by contact. This is a very practical technology for quickly pairing a wireless headset, transferring data or paying by contact using so-called “secure” applications. Secure, yes, but with one detail, all it takes is for a careless person to approach your smartphone with another terminal (smartphone or other device allowing the NFC emission range to be intercepted) to intercept your banking data and steal your money. This so-called MITM method is less common given that all payment applications now require confirmation by biometric authentication or 2FA code in order to validate a payment. However, several bank cards integrate this technology, and the risk of seeing your data disappear into the wild is now increased. To secure a bank card with contactless payment, store your cards in a safe place, not just in your back pocket, but ideally in a wallet or Faraday card holder, capable in principle of blocking wireless communications.
  • Have a unique password on each of your devices. Passwords allow you to protect access to our online accounts, but also to protect our computers, smartphones and connected devices. It is imperative to use a unique password on each product you own that may contain sensitive data (social networks, bank accounts, etc.). The password serves as a barrier in the event of theft or loss of the device, and protects it against people who are a little too curious. Recent years have seen the emergence of biometric locks (facial recognition or fingerprint). If one of your devices has it, it would be a good idea to take advantage of it.
  • Enable two-factor authentication (2FA). This feature helps add an extra layer of protection to your online accounts. As soon as you try to connect to an online service, you will be asked for a 2FA code (sent by SMS or generated by an application like Google Authenticator or via a physical key like those from Yubikey) to confirm that it is well you. For your security, two-factor authentication is imperative these days.
  • Never use a public, unencrypted Wi-Fi network. Unencrypted Wi-Fi networks are used in several places, such as airports, train stations, fast food restaurants or even in public spaces, etc. Very practical for connecting occasionally when you do not have direct access to 3G/4G/5G except that these networks do not provide encryption of the data transmitted between your device and the Wifi router, which means that all the data is in clear text and can be easily intercepted by a hacker on the same network. To be avoided, quite simply.
  • Turn off Bluetooth and Wi-Fi when you don’t need them. With all the wireless devices we own, we sometimes forget to have Wi-Fi or Bluetooth turned on without actually using them. Most Android smartphones turn off Wi-Fi after a period of inactivity, but keeping Bluetooth on, even passively, is a real risk for your safety. It’s a good idea to deactivate them to not only reduce the risk of remote hacking, but also to gain precious minutes of battery life.
A lire également  DUCKDUCKGO: A search engine that respects your privacy