Cybersecurity for the masses: best practices and tools Cybersecurity for the masses: best practices and tools

In one of the earlier posts dedicated to virtual private networks, we mentioned that signing up for a VPN service does not mean you are totally protected while online (and offline, by extension). Cybersecurity is not a new field, it started shaping during WWII, with the need to encrypt and decrypt messages, and the first recorded hacking as we basically understand it now happened at MIT in 1961. Regular users, though, began to recognize this term much later, in the early 21st century, when computers and all sorts of hackable digital devices became ubiquitous. Today, neglecting protection in the virtual world is a recipe for disaster. And although hacking now involves a lot of social engineering, technical safeguards remain essential to online safety. We’ll save the former for a later piece and cover the latter in this one.

1. Antivirus software

As simple and basic as it sounds, antivirus software remains the foundation of a sound cybersecurity strategy. Sure, Windows has Defender, and it is a decent enough protection; but will you settle for “decent enough” when with the ultimate threat of complete identity theft, pretty much everything about your person is at risk?

There are many packages out there, from open-source (ClamWin, Armadito, MoonSecure) programs to comprehensive antivirus suites offering industry-grade security (Kaspersky, ESET, Bitdefender). The names in parentheses are just examples; check out Informer’s Antivirus & Security section and find a solution that fits your needs:

Informer – Antivirus & Security

2. VPN (Virtual Private Network)

Long story short, VPN encrypts your traffic when you browse, and keeps eavesdroppers away when you, for example, enter your credit card credentials in an online store. It’s not a guarantee that you’re completely safe while browsing, but a thick layer of protection that makes hacking you a much more tedious process. Check these posts about VPN we published earlier:

3. Firewall

Originally, a firewall is sort of a permanent shield dividing a space and preventing fire from spreading and destroying everything. In IT, a firewall plays a slightly different role: it only blocks connections that violate the rules, and lets those compliant therewith through. Firewalls are integral parts of modern operating systems; in Windows 11, the firewall is merged with Defender.

Regular users rarely poke around settings of the built-in firewall in Windows, because it comes set up quite well out of the box. There are scenarios, however, which call for adjustments, or even a third-party tool that’s more robust and easy to configure. If you believe this is your case, consider Comodo Free Firewall, ZoneAlarm Free Firewall, or GlassWire Firewall.

4. Password managers

Most people are slow learners, alas. The fact that 123456 is still the most popular password in the world, followed by – drumroll (and facepalm) – 123456789 proves this statement. It should be acknowledged, though, that inventing passwords that don’t trigger the “think again, this one’s too weak” reaction isn’t such an easy task, and memorising those that are strong enough is next to impossible for the average person. Password managers to the rescue: programs like KeePass, Kaspersky Password Manager, Trend Micro Password Manager generate passwords, store them securely, and can be set up to be accessible across all your devices. Check out the respective section of the Informer Catalog:

Informer – Password managers

5. Two-factor authentication (2FA)

Simply put, two-factor authentication means that to log on to a service or a site, you have to enter a single-use code usually sent in an SMS or taken from a standalone app like Google Authenticator. There may be more exotic options like opening some application and performing an action therein.

Anyway, this one is quite simple: enable 2FA whenever a service suggests that. This does add a step to your journey, but it’s a solid layer of protection, definitely worth the extra effort.

6. Regular software updates

This one is as simple and plain as the previous one: keep your software fresh and patched, check for updates and run them on a regular basis to make the wall separating you from assorted malicious actors a bit thicker.

Many programs nowadays have automatic update routines and require little intervention in this regard. But if you want an automated solution that does it all without bothering you, get Software Informer, a lightweight and free updater app that keeps your programs fresh and secure:

Download Software Informer

7. Data backup

Regardless of how prepared you are for incidents, there is simply no 100% guarantee nothing bad will happen to your hardware and software. A power surge frying the drive is a real possibility, same as a cat (or you) spilling coffee on the laptop. 

A good contingency plan always includes backing up everything important. We’ve covered this subject in a three-part series, check it out:

8. Secure browsing practices

You will be amazed upon learning that even weathered IT professionals fall prey to internet scams of all types. Wrongdoers are very inventive, they ride the very tip of the technology wave, so all those levels of protection mean nothing unless you stay vigilant, don’t click links in letters from unknown senders (nor open files therefrom), and generally observe the online hygiene principles based on common sense. At Informer, we keep tabs on major cybersecurity developments, so stay tuned to learn about real threats in a timely manner!

Author's other posts

Opera’s Browser Operator: a first universal AI application?
Article
Opera’s Browser Operator: a first universal AI application?
Opera's Browser Operator aims to automate chores like shopping and booking, going beyond current AI assistants by completing tasks right in the browser.
The dangers of unsubscribe links and how to avoid them
Article
The dangers of unsubscribe links and how to avoid them
Email marketing remains key with up to 4200% ROI. Yet, watch out for unsubscribe scams! Stay alert, verify senders, and use safe opt-out methods to keep your data secure.
It’s over for Skype. What are the real alternatives?
Article
It’s over for Skype. What are the real alternatives?
Microsoft to shut down Skype by May 2025. Users urged to switch to Microsoft Teams, or they can consider alternatives like Google Meet, Slack, Jami, and Talky.
AI-based services for all: image generators for social media
Article
AI-based services for all: image generators for social media
Explore lesser-known AI tools like Adobe Firefly, Freepik, Canva, DreamStudio, and Ideogram for stunning social media imagery.