Sécurité sur Internet

How to strengthen your internet security in 2022?

Maintaining the security of your internet is not a simple task in the midst of threats of all kinds malware; software vulnerabilities; service breaches and data leaks; phishing and disinformation campaigns; creeping loss of privacy rights; and all kinds of attacks with ransomware and phishing in the lead, as you could see in the selection of the worst incidents of 2021.

The number of devices connected to the global network has grown exponentially, with all that this implies in terms of mobility, home automation, smart cars and Internet of Things devices. Add to that the pandemic and the movement of millions of employees and students from work networks to (generally less secure) home networks and you have a difficult scenario for protecting yourself from cyber threats.

Strengthen Internet security

All of the above requires the user proactive behavior and a lot of common sense understand that virtual life must be protected today as much as physical life and that domestic tasks have become dangerously mixed with professional tasks. Certainly, whatever we do, it is not possible to guarantee 100% security and confidentiality in a global network, but we can try to do it with a series of measures that we are going to remind you of and which include strengthening online accounts, applications, equipment where we use them and the necessary precautions in the use of the Internet and its services.

Internet security

1.- Protect your browsers

All web browsers have advanced security features that we need to review and configure to enable, as these are the applications we use to access the internet and its services. In addition to checking end-to-end encryption as part of synchronization or process isolation (sandboxing), we should pay attention to warnings about dangerous sites displayed by browsers.

Also check the installed extensions as some are a common source of malware introduction. Another interesting possibility is to use a “guest mode” session that is completely detached from the user’s original profile, including settings or history. Finally, highlight the use of “private mode” (or incognito mode) to improve privacy, as it helps avoid tracking through cookies, open user sessions and other systems used for this purpose.

2.- Update the operating system and applications.

Windows Update provides the latest updates to the Windows operating system, with security fixes for known threats that are required to be installed. With automatic updates, there is no need to check for updates online or worry that your computer may be missing critical patches or device drivers for Windows.

It is equally, if not more important, to update installed applications to the latest versions, as these often contain security patches. When the versions are older, they are at greater risk of being attacked by cybercriminals who find vulnerabilities in the program, with particular incidence in some very widespread programs such as Java, Adobe Flash or Reader.

3.- Use security solutions

Microsoft offers Windows Defender as a native security solution in its operating systems and its use is mandatory in Windows as basic protection for a consumer, although various specialist vendors offer a number of security solutions, many of which are free , which can be used. An advanced or professional user should consider using a comprehensive commercial security suite that includes other security tools such as a firewall and specialized tools against ransomware, phishing, adware or spyware attacks.

Internet security

4.- Manage passwords well

Another of the golden rules to improve your online security (apart from the use of advanced biometric identification techniques if the device you are using allows it) is to have a strong and different password for each website . Passwords are certainly an unattractive method for the user, but they remain the preferred method of authentication for accessing Internet services or logging into operating systems, applications, games and all kinds of machines.

A lire également  Alibaba: US leads investigation

Strong passwords prevent brute force attacks, and using a different password for each account prevents all accounts from being compromised at once in the event of a data breach. You must follow a series of rules for their creation and value the use of password managers that are capable of doing the work for us, reducing human errors in their management and automating the process of generation and administration.

5.- Use two-factor authentication.

2FA is an access control method known as “two-factor authentication”, “two-step authentication” or “two-step verification”, which has become one of the most common security mechanisms most important in the technology sector when it comes to user authentication and identity protection. Two-factor (or two-step) authentication provides an extra level of account security because you don’t just have to crack the username and password.

This feature is already available on most major Internet services and should be used whenever possible. Typically, it uses a verification code served by a mobile app or SMS, which reinforces the use of passwords, username and password when logging in.

6.- Promote the use of encryption

BitLocker disk encryption is a data protection feature of the operating system, available in the Professional and Enterprise editions of Windows 10 and 11. BitLocker allows you to encrypt or “scramble” the data on your computer in order to protect it. protect against threats such as data theft or exposure if equipment is lost, stolen or improperly removed, and ultimately improve online security. BitLocker can be enabled on the operating system drive, on a fixed data drive, or on a removable data drive. There are equivalent or better third-party solutions worth considering for use.

How to Strengthen Your Internet Security to Start Year 34 Right

7.- Use a hardware security key for vital accounts.

For mission-critical accounts, especially in business and commercial environments, it is advisable to go the extra mile to protect them using a hardware security mechanism. This is usually a flash drive that plugs into a USB port and contains a highly secure encryption engine. The entire process takes place within hardware, which significantly increases overall security compared to software solutions.

8.- Avoid free wireless networks.

Free hotspots have spread to multiple locations in cities, restaurants, airports, train and subway stations, hotels and all kinds of businesses. Darkhotel, the advanced persistent threat (APT) discovered by Kaspersky Lab, has confirmed the inherent insecurity of public wireless networks. He is said to have been active since 2007 and is dedicated to obtaining inside information from high-level executives and employees staying in high-end hotels. Security researchers have shown that they are easily hacked and should only be used for casual browsing.

9.- Use backups

We have already said that 100% security in a connected world simply does not exist, and not just because of a virus, since a hardware error can lead to the loss of valuable personal and/or professional information. Making backup copies (what we know as Backup) is therefore highly recommended for a user or professional who intends to protect personal and corporate information on a computer, while being a task of maintenance which contributes to the health of the equipment. Backup copies must be stored on a storage device external to our computer and/or in a cloud storage service.

Internet security

Use common sense!

As always when we talk about Internet security (and cybersecurity in general), caution is a preferential barrier against malware and, therefore, we must be especially careful when downloading and installing applications from unsafe sites , when we browse certain Internet pages, when we open unsolicited emails or attachments, when we open emails from social networks or messaging applications or when we use operating systems and applications that have not been updated, which contain vulnerabilities that can be exploited by cybercriminals for malware campaigns.