About 10 percent of all Internet time is responsible for going to social networking or blogging sites by two-thirds of the world’s Internet population. While social networking is about being well-intentioned, you need to be aware, however, cybercrime is increasing, cyber criminals have tried to trap online social networkers without proper care It’s okay. You can protect yourself, but you have to know how. This article provides several ways to reduce the risk of participating in your favorite social network.
Go to your favorite social media sites by typing them to the exact address in your browser. Never visit via email link or through any other website because it can be a trap to get your account name and password.
After going to a site and logging in, see the padlock icon. This is an indication that the site has been certified and encrypted by Transport Layer Security (TLS).
Take the time to find out how cyber criminals work. The most common methods are via email (phishing and spam), malware, adware and spyware. Softening is being done with software at all times:
Consider whether any software that you are downloading that can access your social media profile is legitimate. Many people use programs that “add friends” for you, or in some way will automatically update your situation. If the software is not benign, then it can spoil your computer’s speed and, in the worst case, can share all your personal information back into the software’s promoters.
Scary Programs – Those programs that say that they are checking your computer for viruses but actually return a wrongly infected return, causing the victim to persuade the credit card information to “clean” the computer . While you will not usually receive such “alerts”! On social media sites, if you click on a bad link (such as your friend’s account has been abducted by a virus or spammer, and is updating with a suspicious link).
If you do not remember anything else, remember these main things:
Always choose a good, strong password. Do not put passwords on personal information, which can be easily accessed or guessed, do not use words that can be found in any dictionary of any language, develop a pandemic to remember complex passwords, Use lowercase and capital letters both, use combinations in letters, numbers, and special characters, when you can, use the pass phrases and use V Use different passwords Inn systems.
Do not confuse being famous online with being protected. If anything, the more you know, the more you know, the more you are exposed.
Do not mistake user-friendliness of social networking sites for security. This user-friendliness increases the ways in which people can get more information about you and this is not always a good thing. think before:
Posting pictures that identify you, your family members and where you live.
Posting photos of your desk’s status It may be that the bank account number you have just closed is clearly a note on the pad square between the photos!
Tell the people that if you want to leave the house then what are they going to do?
Adding your child’s name in any picture.
Know how your chosen social media sites protect your privacy. Just do not think that they will do this, rather they will know how they will do it and how it will be done. It means reading their terms and conditions and “Frequently Asked Questions”. If you still do not know, send a question to their support team, or leave your questions on forums or other communication channels for general questions.
Hide your personal information from others. Did you know that social networking sites ask for things (age, date of birth, email address, phone number, mother’s first name), all the things that a hacker needs to tell you or impose on someone Do you know which information you get?
Never give personal information to any person you have just met online They can not be good and you have no way of knowing.
Do not accept anyone as part of your friend’s list. To do this, you get as much information as possible about the possibility of an identity thief. Be smart and research some background first. If you want to make so many friends (such as on Twitter and Facebook sites like this), be very careful if any of you who do not know you well then starts asking a lot of personal questions. Or “wants to meet” You “believe in your nature.”
Be aware. It’s good to keep an eye on using email information and links. Do not follow any links sent to you by email, first think:
Never go on a site through your email. Even if it is not requested before. Just type the name of the site in your browser and open it like this
Avoid answering emails in Zest too. Although you can feel tempted to answer with a weird answer, it can actually be harmful if it confirms your existence. Best of all, it will lead to more spam; Worstly, it may lead cyber criminals to learn more about you as much as they would have answered you.
Be careful about opening an attachment. The basic rule should be to open them only when you get them from those people that you really trust. Looking at the easily cyber criminal who can make an identity, it can be someone who can send you information such as a friend, which includes maliciousness:
Consider the general behavior of the sender. do you know this person? Do you rely on your ability to judge whether the information is reliable or not? Is this person in the character to send such links to this person, or is it out of the norm? They may have received a virus through their messaging software and this is their computer, which is not the real person.
Find things that are not right. If you get an invitation to visit a site, or to give information to someone you know, consider whether it is an interest or not actually what they will have. For example, if they ask you to go to a music site, first ask yourself if the sender is the real fan of the musician whose site has been sent to you right now? If this is incorrect, then proceed with great caution, and preferably contact the sender first.
Protect yourself. This includes using anti-virus, anti-spyware programs, and a firewall.
Keep in mind the most when using public computers. Keep in mind that people can not see what you are surfing and, if possible, avoid using passwords, in particular they link to bank accounts and other important sites.
Report Cyber Crime and IP Fraud. It is only by being cautious that we can stay one step ahead of cyber criminals, and reporting their activities helps in making a big picture of what is happening, as well as potentially help you .
Watch the news. Stay updated on the news about online safety incidents. Breaking news will appear on Twitter and Facebook within some time, and anything around the virus will be mentioned on them, as well as in the news too.
Subscribe to the technical blogs that keep you updated on new security issues. Another way to be informed is to use news feeds or to have alerts sent to you from search engines or specific sites that are interested in viewing internet security issues including consumer affairs sites.
Teach children to beware of online dangers. Find sites that will help you as a parent or guardian who explain issues related to online safety. You do not need to find out how to do it all alone – there are prestigious, quality, independent sites that assess and monitor online media challenges for children. Find such sites and watch content and games for kids that can help your children learn about issues.
Teach kids responsible computer use. Take the time to explain:
Cyber crime in simple words
Ways to be responsible online
The importance of privacy settings and how to use them
Which age-appropriate sites you’re happy for them to use – focus on what they can do, rather than what they can’t
Keep computer where you can see them while kids are using them. And tell the kids that you are always available to help them if they feel worried or upset about anything online – the most important lesson is about your own reach and the desire to fix problems online with them. Be consistent – Children respect those boundaries that you constantly determine when you are persistent and what you preach when you practice.
Creative Commons License