10 Ways to outsmart cyber criminals

Big day; our first guest contribution! Johann Bergh, a professional translator and recovering software developer put together this list of 10 ways how you can be proactive and outsmart cyber criminals. Enjoy, and take action!

Information is key to the success of cyber criminals. It is the driver that enables them to destroy, steal and extort. Cyber criminals are great detectives. They unite scraps of information from various sources into a nefarious plan. “What’s the big deal?”, you may ask. You are the big deal, because you could be their next target. Your online presence puts you at risk. Reducing your personal online content is an important weapon in the fight against cyber criminals.

1. Social media – you don’t have to be famous

We all love social media. Posting cool pictures of yourself in weird and wonderful places, complemented by exotic people in the same photo frame. And it’s so much fun browsing the photos (and the latest gossip news) of family and friends. Beware! The information that you post online is a treasure trove for foreign governments and cyber criminals alike. Be selective with what you share. If you took 100 photos of a weekend outing, select 3 or 4 appropriate pictures and be cognisant of the comments that you add. Too much information gives would-be identity thieves a foot hole 1. Most social media platforms have privacy and security settings. Be sure to tighten them. You don’t want everything to be available to the whole world!

2. Minimize online accounts

Let’s be honest. The average person has accounts on more websites than they care to remember. Unfortunately, many sites only give access to their resources after you have created an account, resulting in an explosion of your digital footprint. In the world of cyber security, more information is bad news 5. How can you reign in your online omniscience? Make an inventory of all the online accounts that you have. Your email inbox might be able to give you some hints if you have forgotten. Log into the accounts and delete them if they have fallen into disuse. If you are unable to delete the account, remove as much sensitive information as you can.

3. Clean up your PC

Did you know that your PC’s hard drive contains documents with very personal and sensitive information? When is the last time that you cleaned up your files? Cyber criminals love information. Financial and personal information are very valuable to them.

How much is the information on your PC worth to you? Intruders can install ransomware 2 on your PC. The result is that all your files are encrypted, and you won’t be able to access it again unless you pay a ransom to the intruder. Delete unimportant files and move unused files with valuable data to an external hard drive (or to the cloud). Ransomware? No problem, reformat and start afresh.

4. Where are all my passwords?

There are so many websites that you sign up for and you don’t want to create a unique password for each of them. So you just reuse the same password across all of the sites. No problem, right? Wrong! Big problem 4.

Consider the following scenario. John creates an account on website X but decides to use the same password as his email website because it’s easier to remember. Unfortunately, website X doesn’t have the same security measures as John’s email provider. Cyber criminals can easily get John’s email address and the password that he used to sign into website X. The cyber criminals go to John’s email website and try to log in with the password John used on website X. And low and behold; they have access to John’s email inbox!

Luckily, there are many free password managers that you can use to generate random passwords for different sites. Download a password manager and make use of it.

Cyber criminals, like pick-pockets, tend to prey on easy targets. Do you have virus protection and is it enabled? Is all your software up to date? Outdated software poses a significant risk 6. It is not uncommon for software packages to release patches on a weekly basis, and there is reason why they call some of these patches “security patches.” Enable automatic updates for all your installed software. These basic steps are easy to follow. Don’t become the weakest link!

6. Avoid the seedy places on the web

Watching the latest series? You didn’t get it from a torrent site. Or did you? Files downloaded from torrent sites often include a nasty surprise: malware 7. Software, with malicious intent, that will be installed on your PC without your consent. You are potentially giving cyber criminals access to your files and computing resources. It’s a blank check. They’re having a field day. Torrent sites aren’t the only dubious, dark corners of the web. Porn sites and online gambling platforms are notorious contenders, inter alia.

7. They are watching you – don’t get tracked

Tracking, tracking, tracking. Online advertising is big business, and you might not be aware that everything you do on the web is tracked and analyzed. Most websites that you visit store a small file on your computer’s hard drive called a “cookie”. These are often used to track your browsing activities for online advertising purposes. More information is available about you. It could give cyber criminals some valuable insights. Browsers have privacy and security settings that you could tighten to minimize tracking 3. Browsers also have several plugins on offer that can help thwart tracking efforts by third parties. Eat the cookie before it eats you!

8. Choose your friends carefully

The internet is a great place to meet new people. Online friendships and romances are commonplace in the modern era of the internet.

However, not all people using the internet are well-intentioned 9. The good news is that there are a few basic considerations that will shield you from internet fraudsters. Don’t reply to dubious Emails. Messages don’t go to your spam folder without reason. Maybe you are love sick. Do your research and join a reputable online dating site and you will meet plenty of like-minded individuals.

9. Don’t leave a paper trail

Despite all the propaganda about saving trees, hard copies of documents are more pervasive than ever. The information on physical documents is just as valuable as the information on digital documents.

Dumpster divers are not only fictional characters that you see in the movies. They exist in the real world 8. How many hard copies of documents with sensitive information do you have? Maybe it’s time for a spring-clean. Consider investing in a paper shredder, if you like working with hard copies.

10. Physical security

Physical security? What does that have to do with keeping cyber criminals at bay? The answer is simple: Grabbing a laptop is the easiest way to make a quick buck and get free access to juicy information 10.

It goes without saying that you shouldn’t leave your electronic devices unattended in public areas. Laptop bags also tend to attract maliciously inclined individuals. A nifty trick is to get a backpack that has a laptop compartment. It will keep the criminals guessing.