Good cyber hygiene habits to help stay safe online
Have you heard of something called cyber hygiene? Surely, brushing your teeth and taking showers isn’t something traditionally associated with technology — yet the term is a useful metaphor for needing to make smart decisions about your smart devices.
Good hygiene is something you’re taught as a child and something that generally sticks with you for the rest of your life. It involves three basic principles: using products and tools that fit your hygiene needs, performing these hygienic tasks correctly, and establishing a routine.
But what is cyber hygiene and what does it have to do with your computer and connected devices?
Cyber hygiene is about training yourself to think proactively about your cyber security — as you do with your daily personal hygiene — to resist cyber threats and online security issues. Unfortunately, cyber security still isn’t taken as seriously as cavities and root canals. Some people take cyber security for granted, but this may change, as cyber threats continue to evolve. In the meantime, establishing solid cyber hygiene practices should be as routine as brushing your teeth.
Here are a few tips to get you and your family thinking about good cyber hygiene practices.
Use the right tools for cyber hygiene
Ever try brushing your teeth without a toothbrush? Without the right tools for the job, maintaining personal hygiene would be a bit more difficult, if not impossible. The same is true for managing good cyber hygiene. Without the right products and tools, personal information you think is secure could, in fact, be at risk.
Reputable antivirus and malware software, a network firewall, and password protection all help to protect personal data stored on your home computer. Taken together, these tools may help you feel confident about the security of your home computer, laptop, smartphone, and other devices.
Additionally, you should always make sure the security brand is a reputable source before installing anything on your computer or other devices.
Make cyber hygiene part of your routine
Learning to monitor your cyber security regularly can increase your chances of avoiding an online threat. But just like any habit you wish to make stick, it requires routine and repetition.
Get started by setting an alarm or marking a calendar with dates to address a series of tasks — things such as scanning for viruses with antivirus software, updating the operating systems of all your devices, checking for security patches, wiping the hard drive, and changing your passwords. Once you begin to get the hang of cyber hygiene, it will become second nature to you.
Be thorough, be accurate with cyber hygiene
Everyone is supposed to floss, right? But does everyone do it as much as the dentist recommends? Deleted or presumably irretrievable files on your computer require a kind of flossing and demand special attention from time to time.
For example, you may think that regularly emptying the trash can or recycle bin removes personal or sensitive data from the hard drive. This is not the case.
To permanently delete files from your computer, you must use data-wiping software. Whenever you introduce new software, add on hardware, or modify system files, you’re at risk of losing personal data. Get in the habit of regularly clearing out data you don’t need and making sure to wipe it clean from the hard drive.
Another area of security that requires your attention is password protection. Don’t get lazy and skimp on creating complex, unique passwords for each account, using combinations of at least 12 letters, numbers, and special characters. Change your account passwords regularly, and you’ll be on your way to better cyber hygiene in no time.
Key steps for good cyber hygiene
Good cyber hygiene is a general practice that can help keep you safe and secure online, but there are several best practices to ensure your cyber hygiene is the best it can be. Here are nine essential steps.
Step 1: Install reputable antivirus and malware software
The first and maybe most important step is installing antivirus software. What is it designed to do? Antivirus software is a program or umbrella of programs that scans for and eradicates computer viruses and other malicious software, or malware. It’s a vital component of your overall cyber hygiene in its protection against security breaches, along with other threats.
Specifically, antivirus software provides protection by performing key tasks, including these.
- Pinpointing specific files for the detection of malicious software.
- Scheduling and performing automatic scans.
- Scanning either one particular file or your entire computer, or a flash drive, depending on your specific needs.
- Erasing malicious codes and software.
- Confirming the “health” of your computer and other devices.
Step 2: Use network firewalls
Using a network firewall is another key habit for maintaining good cyber hygiene. Firewalls are a first line of defense in network security by preventing unauthorised users from accessing your websites, mail servers, and other sources of information that can be accessed from the web.
Step 3: Update software regularly
Update your apps, web browsers, and operating systems regularly to ensure you’re working with the latest programs that have eliminated or patched possible glitches. Setting up this feature to update automatically will help ensure you have the latest protections.
These updates are particularly important because they often include software patches. Software developers issue security patches whenever they discover software flaws — flaws that could let in viruses or cybercriminals. Developers may not always alert you when a critical patch has been implemented, because this might give cybercriminals the heads-up, as well. Thus, regular updates will ensure these patches plug any holes in your software.
Step 4: Set strong passwords
Setting strong passwords for all of your devices is essential. Your passwords should be unique and complex, containing at least 12 characters along with numbers, symbols, and capital and lowercase letters. Changing your passwords regularly — and never sharing or reusing the same password — will help prevent cybercriminals from figuring them out. Try using a password manager to help setup and keep important passwords secure.
Additional device controls are firmware passwords. These are hardware passwords that help prevent others from using your computer. While disk encryption prevents cyberthieves from accessing information stored on your device, firmware passwords protect your hardware by preventing your machine from being rebooted or reset without your password.
Step 5: Use multi-factor authentication
Two-factor or multi-factor authentication is a best practice that offers an additional layer of protection. Two-factor authentication usually requires you to submit your password and username along with, say, a unique code that is sent to your phone. This may be all that is needed for some systems, but multi-factor authentication adds additional layers of security with the use of biometrics, like facial or fingerprint recognition, to make it harder for cybercriminals to gain access to your device and personal information.
Step 6: Use device encryption
While most companies automatically have data encryption processes in place, you also may want to encrypt your devices and other media that contain sensitive data — including laptops, tablets, smartphones, removable drives, backup tapes, and cloud storage. In fact, many devices use encryption as the default for data stored on smartphones. Some apps are using end-to-end encryption, and other services encrypt data on your devices and back them up in the cloud. Another option is to use an encrypted USB memory stick for protecting sensitive data.
Step 7: Back up regularly
It’s also smart to keep your files secure by backing up important files offline, on an external hard drive, or in the cloud. This can help protect against many types of data loss, especially if cybercriminals gain access to one of your devices.
Step 8: Keep your hard drive clean
If you’re selling your laptop, tablet or smartphone, it’s important to ensure your personal or sensitive information doesn’t get passed along, as well. If your device is compromised, a clean hard drive means less information that’s accessed.
But merely deleting files or data may not be enough. Part of good cyber hygiene is reformatting and then wiping your hard drive clean. For example, if you want to sell your computer and have used it for online banking, you’ll want to consider disk-wiping to remove software and data from your hard drive.
Step 9: Secure your router
Don’t forget to protect your wireless network. This involves turning off and updating the default name and password the router came with from the manufacturer, turning off remote management, and logging out as the administrator once it’s set up. Also, make sure your router offers WPA2 or WPA3 encryption to maintain the highest level of privacy of information sent via your network.
Remember, it’s smart to practice good cyber hygiene habits. If you set up your computer and other devices with reputable online security programs, update them regularly, create strong passwords, and keep everything clean, you’ll be on your way to creating cyber habits that may help keep you safe and secure online.
Copyright © 2021 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.