Cybersecurity for the masses: best practices and tools Cybersecurity for the masses: best practices and tools

In one of the earlier posts dedicated to virtual private networks, we mentioned that signing up for a VPN service does not mean you are totally protected while online (and offline, by extension). Cybersecurity is not a new field, it started shaping during WWII, with the need to encrypt and decrypt messages, and the first recorded hacking as we basically understand it now happened at MIT in 1961. Regular users, though, began to recognize this term much later, in the early 21st century, when computers and all sorts of hackable digital devices became ubiquitous. Today, neglecting protection in the virtual world is a recipe for disaster. And although hacking now involves a lot of social engineering, technical safeguards remain essential to online safety. We’ll save the former for a later piece and cover the latter in this one.

1. Antivirus software

As simple and basic as it sounds, antivirus software remains the foundation of a sound cybersecurity strategy. Sure, Windows has Defender, and it is a decent enough protection; but will you settle for “decent enough” when with the ultimate threat of complete identity theft, pretty much everything about your person is at risk?

There are many packages out there, from open-source (ClamWin, Armadito, MoonSecure) programs to comprehensive antivirus suites offering industry-grade security (Kaspersky, ESET, Bitdefender). The names in parentheses are just examples; check out Informer’s Antivirus & Security section and find a solution that fits your needs:

Informer – Antivirus & Security

2. VPN (Virtual Private Network)

Long story short, VPN encrypts your traffic when you browse, and keeps eavesdroppers away when you, for example, enter your credit card credentials in an online store. It’s not a guarantee that you’re completely safe while browsing, but a thick layer of protection that makes hacking you a much more tedious process. Check these posts about VPN we published earlier:

3. Firewall

Originally, a firewall is sort of a permanent shield dividing a space and preventing fire from spreading and destroying everything. In IT, a firewall plays a slightly different role: it only blocks connections that violate the rules, and lets those compliant therewith through. Firewalls are integral parts of modern operating systems; in Windows 11, the firewall is merged with Defender.

Regular users rarely poke around settings of the built-in firewall in Windows, because it comes set up quite well out of the box. There are scenarios, however, which call for adjustments, or even a third-party tool that’s more robust and easy to configure. If you believe this is your case, consider Comodo Free Firewall, ZoneAlarm Free Firewall, or GlassWire Firewall.

4. Password managers

Most people are slow learners, alas. The fact that 123456 is still the most popular password in the world, followed by – drumroll (and facepalm) – 123456789 proves this statement. It should be acknowledged, though, that inventing passwords that don’t trigger the “think again, this one’s too weak” reaction isn’t such an easy task, and memorising those that are strong enough is next to impossible for the average person. Password managers to the rescue: programs like KeePass, Kaspersky Password Manager, Trend Micro Password Manager generate passwords, store them securely, and can be set up to be accessible across all your devices. Check out the respective section of the Informer Catalog:

Informer – Password managers

5. Two-factor authentication (2FA)

Simply put, two-factor authentication means that to log on to a service or a site, you have to enter a single-use code usually sent in an SMS or taken from a standalone app like Google Authenticator. There may be more exotic options like opening some application and performing an action therein.

Anyway, this one is quite simple: enable 2FA whenever a service suggests that. This does add a step to your journey, but it’s a solid layer of protection, definitely worth the extra effort.

6. Regular software updates

This one is as simple and plain as the previous one: keep your software fresh and patched, check for updates and run them on a regular basis to make the wall separating you from assorted malicious actors a bit thicker.

Many programs nowadays have automatic update routines and require little intervention in this regard. But if you want an automated solution that does it all without bothering you, get Software Informer, a lightweight and free updater app that keeps your programs fresh and secure:

Download Software Informer

7. Data backup

Regardless of how prepared you are for incidents, there is simply no 100% guarantee nothing bad will happen to your hardware and software. A power surge frying the drive is a real possibility, same as a cat (or you) spilling coffee on the laptop. 

A good contingency plan always includes backing up everything important. We’ve covered this subject in a three-part series, check it out:

8. Secure browsing practices

You will be amazed upon learning that even weathered IT professionals fall prey to internet scams of all types. Wrongdoers are very inventive, they ride the very tip of the technology wave, so all those levels of protection mean nothing unless you stay vigilant, don’t click links in letters from unknown senders (nor open files therefrom), and generally observe the online hygiene principles based on common sense. At Informer, we keep tabs on major cybersecurity developments, so stay tuned to learn about real threats in a timely manner!

Author's other posts

Is it on? How top AI makers responded DeepSeek’s success
Article
Is it on? How top AI makers responded DeepSeek’s success
DeepSeek shakes up AI, prompting OpenAI, Microsoft, and NVIDIA to react swiftly while Alibaba and ByteDance push forward with new LLMs in a competitive AI landscape.
Two weeks with DeepSeek: the scoop
Article
Two weeks with DeepSeek: the scoop
DeepSeek, a Chinese AI, soared past ChatGPT in the App Store. The startup claims to have spent only $5.6M on training the model. Let's see what's what after 2 weeks on the air.
Seven valid reasons to set up a VPN
Article
Seven valid reasons to set up a VPN
In case you were thinking a VPN setup or subscription isn't something you need, here are 7 real-world reasons that may have you reconsider.
Top 10 VPN services compared (2025)
Article
Top 10 VPN services compared (2025)
Here is the list of top VPN providers that revolves around the features that matter: latency, jurisdiction, coverage, and pricing.