Tech

10 tips to improve Internet security in 2023

Internet security is threatened by malware of all kinds; service breaches and data leakage; hoax and misinformation campaigns; loss of the right to privacy or unpatched software vulnerabilities that are exploited for all kinds of attacks with Ransomware and Phishing as exponents, as we saw in the selection of the worst cybersecurity incidents of 2022.

Besides, the number of devices connected to the global network It has grown exponentially and personal computers have been massively joined by mobile devices, wearables, smart cars or everything that comes from home automation and the Internet of Things. And to aggravate the situation, the “hybrid work” that we are having to live, adds and combines professional and domestic tasks, hindering the ability to stay safe in this jungle called the Internet.

Internet security

Internet security: how to strengthen it

Guaranteeing 100% security and privacy is very difficult in a global network, but we can strengthen it and anticipate the arrival of threats with a series of proactive measures that include strengthening online accounts, applications, equipment where we use them and the due precautions in the use of the Internet and its services. Common sense is another great defense here, as is psyching yourself up Virtual life must be protected today as much as physical life.

1.- Protect web browsers

All browsers include advanced security features whose activation we must review and configure because they are the main applications we use to access the Internet and its services. In addition to reviewing end-to-end encryption in synchronization or sandboxing (sandbox), we must pay attention to the warnings about insecure sites that browsers display. Also review the installed extensions because some are a frequent source of malware introduction.

Another interesting possibility to improve privacy is the use of “Private Mode” (also known as incognito mode), since it prevents tracking through cookies, open user sessions and other systems used for this purpose. Finally, point out the use of the “Guest Mode”, which is totally detached from the user’s original profile, including configuration or history, thus protecting their data.

2.- Update the operating system and applications

Any type of software is susceptible to vulnerabilities that cybercriminals exploit for computer attacks. Hence the need to always use the latest versions of the software that we use, especially operating systems. They all have mechanisms for this and in the case of Windows, the most used and exploited, has Windows Update to provide automatic updates that facilitate patching and updating to the latest versions. If you are experienced and prefer to do it manually, the Microsoft Update Catalog is an official web portal where you can find released security updates for Windows operating systems.

Just as important as keeping operating systems up to date is updating the applications that we have installed and that also publish the corresponding security patches. It must be understood that when the software versions are older, they are at greater risk of being attacked, with special incidence in some widely distributed ones such as Java, Adobe Flash, Reader or Internet Explorer, which have been a constant source of security problems.

3.- Use security solutions

In an operating system like Windows, the most widely used and therefore the most attacked, it is likely that even the most prudent user in the use of his computer will have to deal with some type of infection. And hence the need to use some type of software to help us with the task. For Windows (also for iOS and Android) Microsoft offers Windows Defender as a native security solution. Although originally released as a basic solution, over the years it has vastly improved in detection and resolution capabilities and is now sufficient as basic protection for most consumers.

Of course, you can use solutions from specialized providers who offer a good number of security solutions, many of them free. An advanced or professional user should consider the use of a comprehensive commercial security suite that includes additional tools such as a firewall and other specialized tools against Ransomware, Phishing, adware or spyware attacks.

4.- Manage passwords well

Another of the golden rules to improve Internet security (in addition to using advanced biometric identification techniques if the device you use allows it) is to have a strong and different password for each website. Certainly, passwords are an unattractive method for the user, but they are still the preferred authentication method to access Internet services or log in to operating systems, applications, games and all kinds of machines.

Strong passwords prevent brute force attacks, and using a different password for each account prevents having all of them compromised at once when a data breach occurs. You must follow a series of rules for its creation and assess the use of password managers that are capable of doing the work for us, reducing human errors in its management and automating the generation and administration process.

5.- Use two-factor authentication

2FA is an access control method that you will know as “two-factor authentication”, “double identification” or “two-step verification”, which has become one of the most important security mechanisms in the technology industry when it comes to to authenticate users and protect identities. Two-factor (or two-step) authentication provides an additional level of account security since it is not enough to compromise the username and password.

This feature is already available in most major Internet services and should be used whenever we can. Generally, it uses a verification code served through a mobile application or SMS, reinforcing the use of passwords, username and password when logging in.

internet security in 2023

6.- Evaluate the use of encryption

BitLocker Drive Encryption is a data protection feature available in the Professional and Enterprise editions of Windows 10 and 11. BitLocker lets you encrypt or “encrypt” the data on your computer to keep it protected against threats such as data theft or exposure in case of loss, theft or inappropriate removal of equipment, and ultimately improving online security. BitLocker can be enabled on the operating system drive, on a fixed data drive, or on a removable data drive. There are equal or better third-party solutions whose use should be evaluated.

7.- Use a hardware security key for vital accounts

For vital accounts, especially in professional and business environments, it is worth going the extra mile to protect them using a hardware security mechanism. It is generally a device in pendrive format that is connected to a USB port and contains a high-security encryption engine. The entire process is done within the hardware, greatly increasing overall security compared to software solutions.

8.- Avoid free wireless networks

Free access points have spread to multiple areas in towns, restaurant areas, airports, train or metro stations, hotels and in all kinds of businesses. Darkhotel, the Advanced Persistent Threat (APT) discovered by Kaspersky Lab, confirmed the intrinsic insecurity of public wireless networks. It would have been active since 2007 and would have been dedicated to obtaining privileged information from executives and high-level employees staying in high-class hotels. Security researchers have shown that these types of networks are easily hackable, so we should only use them for occasional browsing and never reveal our personal data.

9.- Use backup copies

We already said that 100% security in a connected world simply does not exist and not only because of the abundant malware, since a hardware error can also cause the loss of precious personal and/or professional information. Making backup copies (what we know as Backup) is therefore highly recommended for a user or professional who intends to protect the personal and corporate information of a computer, as well as being a maintenance task that contributes to the health of the hardware. Backup copies must be stored on a storage device external to our team and/or on a cloud storage service.

10.- Common sense

As always when we talk about Internet security (and cybersecurity in general) prudence is a preferred barrier against malware and therefore, we must be especially careful in the section on downloading and installing applications from unsafe sites; when browsing certain Internet pages; in opening unsolicited emails or attachments; in those that come from social networks or messaging applications or in the use of operating systems and applications that have not been updated, which contain vulnerabilities that can be exploited by cybercriminals for malware campaigns.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *