IS USING INTERNET SAFE?

Image
Many people surf the Internet as part of their work activities, others visit a wide range of pages to stay fully informed of the news in the world, perhaps simply to complement their educational training or to entertain themselves during leisure hours. But everyone wonders if it is really possible to surf safely on the internet and that is precisely what this article is about. What Is Internet Security? Within the operating rules and policies that are part of the management of the websites to which users have access, a series of parameters have been established in order to prevent and control unauthorized entry to the resources available within Internet. This is part of internet security and its goal is to maintain a level that allows users to enter each page without risks to their computer or the integrity of their personal information. Therefore, talking about security is having ways to prevent, protect and avoid unauthorized intrusion to private networks, such as corporate or ev

HOW TO BE SAFE WHILE BROWSING?

Safe Browsing, browse smart. Behind this anglicism hides the best practices to adopt when surfing the Internet. By following them, you will minimize the risk of infection and best protect your digital identity.

How to be safe while browsing?
Keep your operating system and all web-oriented applications up to date: Contrary to popular belief, it is more common to be infected by visiting ordinary and usual sites (electronic press, airlines, travel agencies, etc.) than so-called risky sites (charming sites, cell phone ringtones, exchange movies / mp3). This situation is due to the fact that hackers want to infect as many machines as possible and the best way to do this is to compromise the sites with the most traffic. Guard against these attacks by keeping your operating system up to date and making sure that all web-oriented applications (primarily Adobe Flash Player, PDF file reader, Java, and Apple Quicktime) are as well.

Software companies understand this need and updates are usually installed automatically, after asking for your consent. People who do not have administration rights on the machine should call their local IT manager to find out what is in place in their lab / faculty to manage this problem.

Use strong and different passwords: We are all followers of the law of least effort, and the temptation to use the same password everywhere is great. Remember, you risk widespread misuse of your digital identity if your credentials are compromised as a result of a security issue on a SINGLE site. Also forget the misconception that a strong password is necessarily difficult to remember.

Keep in mind that digital identity theft does exist: It can happen that our identity is usurped and misused (following the compromise of our password, as we have just seen or, quite simply by creating an illegitimate account in our name on a social network x or y) to send SPAM, for fun or just to harm. Develop your critical sense. All information (and its source) should be viewed with caution and caution!

Check the server certificates: Digital certificates are a kind of identity card issued by a trusted organization to a server (a site). They are generally used when establishing an encrypted connection (HTTPS) so that the server can prove its identity to the clients of its services (online payment, consultation of sensitive data, etc.) and thus attest to its legitimacy. Modern browsers check these certificates and notify you of any problems. Unless you are 100% sure of the legitimacy of a site, refuse to communicate any sensitive data to a site with an incorrect certificate. It could very well be a phishing site.

Watch out for typos: Here again, we are waiting for you at the turn the slightest typo is sanctioned by a visit to an advertising site or a copy of the site you wish to visit. Lately, many users have had their Facebook ID stolen by going to http://www.facebok.com. Take a few seconds to verify that you haven't made a typo.

Beware of plugins and other unnecessary or phony toolbars. During installation, more and more applications offer you to install toolbars or other software developed by business partners. Unless you are sure of your choice, systematically refuse these supplements.

Heed your browser warnings. The four most used browsers, namely Firefox, Internet Explorer, Google Chrome and Opera, offer you protection (Google Safe Browsing and Microsoft SmartScreen) against fraudulent and compromised sites by displaying a warning when attempting to connect to these last. As a general rule, it is advisable to heed these warnings and to refrain from visiting sites that have been listed as unsafe.

Beware of questionable download sources: Pay attention to where the files you download come from. Whenever possible, always download software from the publisher's site or from one of the mirrors mentioned on its site. You will thus avoid nasty inconveniences (paid installations, integrated toolbars, etc.). Flee like the plague the sites of the domain softonic.fr.

Antivirus is automatic: Although your vigilance is the best protection against viruses, Trojans and other unwanted items, the antivirus is an additional bulwark for all situations where curiosity takes precedence over reason, where your attention is momentarily diverted or simply when you browse sites that have been compromised.

For your home machines, we recommend that you use the antivirus or use inbuilt “Windows Defender”, which offers quite decent protection without penalizing system performance too much.

Curiosity is not always your friend: You downloaded or received a slightly questionable file and common sense would dictate that you do not open it. But your curiosity invites you to do the opposite? So call on VirusTotal, which will submit your file to around 40 different antivirus engines. Although this service cannot 100% prove the safety of a file, it is still much more relevant than the single antivirus engine installed on your machine.

Comments

Popular posts from this blog

SIGNS THAT YOUR DEVICE HAS BEEN HACKED?

HOW TO STAY UP TO DATE ABOUT KEEPING DATA SAFE?

IS USING INTERNET SAFE?